Phishing Attacks Disguised as an Email From the Boss
Getting an email from the boss isn’t always a good thing, but in this case,…
ALL stories
Getting an email from the boss isn’t always a good thing, but in this case,…
After previously exploiting Microsoft Excel for formula injection attacks, hackers have now turned their attention…
Integrity is one of three vital components of securing information held within an organisation. Integrity…
A new Linux backdoor trojan discovered, Jack’d app exposes private user images, and Huddle House POS system breach on episode 213 of our daily cybersecurity podcast.
Not all hackers are intent on stealing data or victimising users. Some use their skills…
Cybercriminals use many techniques to extort money from unsuspecting victims. One recent technique uses a…
The dangers of low security on the Internet of Things (IoT) devices once again surfaced…
Mozilla has recently released its browser version Firefox 65 that brings enhanced content blocking. With…
A new sextortion scam claims to infect users through popular adult website, Chrome to warn of lookalike URLs, and Houzz suffers user data breach on episode 212 of our daily cybersecurity podcast.
In iOS 12, Apple implemented the use of Shortcuts App into its voice assistant Siri. These…