Voicemail as bait

Credit to Author: Maria Vergelis| Date: Thu, 26 Sep 2019 10:37:07 +0000
Scammers try to access Microsoft services using fake voice messages.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Maria Vergelis| Date: Thu, 26 Sep 2019 10:37:07 +0000
Scammers try to access Microsoft services using fake voice messages.
Read More
Credit to Author: Nikolay Pankov| Date: Tue, 24 Sep 2019 17:26:09 +0000
What cyberimmunity means in practice and in the industrial infrastructure environment.
Read More
Credit to Author: Sergey Lurye| Date: Tue, 24 Sep 2019 12:01:05 +0000
According to recent news, quantum supremacy is reached. What should we do about it?
Read More
Credit to Author: Jeffrey Esposito| Date: Tue, 24 Sep 2019 09:39:31 +0000
Jeff and Dave discuss the reduction of human listening for Google Home, AI being used in schools, TikTok scams, and more.
Read More
Credit to Author: Leonid Grustniy| Date: Mon, 23 Sep 2019 16:17:38 +0000
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
Read More
Credit to Author: Emma Kenny| Date: Fri, 20 Sep 2019 10:02:28 +0000
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
Read More
Credit to Author: Nikolay Pankov| Date: Fri, 20 Sep 2019 08:20:33 +0000
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity
Read More
Credit to Author: Nikolay Pankov| Date: Fri, 20 Sep 2019 01:27:41 +0000
Toyota’s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.
Read More