What are some common ploys targeting PayPal users? Here’s what you should watch out for when using the popular payment service. PayPal is one of the key players in the field of online payment providers, operating as a payment processor for popular online marketplaces, auction websites, as well as other commercial sellers. Popular brands such … More How scammers target PayPal users and how you can stay safe
They’re supremely easy to remember, as well as easy to crack. Here’s how to improve your password security. Cybersecurity experts often share advice about the do’s and don’ts of passwords as a vital part of good cyber-hygiene practices. And yet, annual roundups of the most common passwords show that many of us continue to prioritize convenience over … More The worst passwords of 2020: Is it time to change yours?
ESET researchers yet again look into notorious Latin American banking trojans. This time they’ve explored Mekotio, a banking trojan targeting Spanish- and Portuguese-speaking countries: mainly Brazil, Chile, Mexico, Spain, Peru and Portugal. Mekotio boasts several typical backdoor activities, including taking screenshots, restarting affected machines, restricting access to legitimate banking websites, and, in some variants, even … More Mekotio banking trojan fakes security update, steals bitcoins and exfiltrates Google credentials
The databases contain personal information that could be used for phishing attacks and identity theft schemes. Researchers have found close to 10.5 billion pieces of consumer data that has been left sitting in almost 10,000 unsecured internet-facing databases hosted across 20 countries. The data is said to include email addresses, passwords, and phone numbers. The study was … More 10 billion records exposed in unsecured databases, study says
Practising good cyber hygiene is a critical part of staying safe online and protecting yourself from threats such as malware, phishing, viruses, and data loss – and it doesn’t just apply to your desktop or laptop. Our phones hold a vast amount of our personal and professional data, so it’s vital that cyber hygiene practices … More Take 5: Essential steps to improve your mobile cyber hygiene