Kinza Yasar
93 articles published since January 25, 2021
Page 2
About Kinza Yasar
Kinza is a technology journalist with a degree in Computer Networking and numerous IT certifications under her belt. She worked in the Telecommunications industry before venturing into technical writing. With a niche in cyber-security and cloud-based topics, she enjoys helping people understand and appreciate technology.
How No Way Home Is Being Used to Scam Spider-Man Fans
Cybercriminals are taking advantage of the hype surrounding the release of Spider-Man: No Way Home to phish for credit card data. Here's how.
What Is Log4j? How to Protect Yourself From the Log4j Vulnerability
One of the biggest security vulnerabilities of recent times, Log4j could have serious repercussions. So how can you protect yourself?
10 Critical Steps to Take After a Ransomware Attack
Ransomware attacks can leave you without your data, your money, or both. If you're a victim of a ransomware attack, follow these steps.
How Firefox 95 Is More Secure Than Previous Versions of Firefox
Mozilla has introduced a new sandboxing technology with its latest Firefox 95 browser release. Does it make Firefox more secure than ever?
What Is a Honeypot and Can It Help Mitigate Cyberattacks?
A bait for luring threat actors, a honeypot is used by cybersecurity professionals to test a network's vulnerability.
HTTPS Everywhere Has Turned 10: Here's What's Changed and Why That Matters
A browser extension that encrypts and secures your communication with websites, HTTPS Everywhere has come a long way. But is it bidding farewell now?
What Is a Zero-Click Attack and What Makes It So Dangerous?
Requiring "zero" user interaction, no amount of security precautions or vigilance can deter a zero-click attack. Let's explore further.
What Is Cobalt Strike and How Can Security Researchers Use It?
Cobalt Strike is an adversary simulation tool used by security teams during vulnerability assessments. Let us explore this useful tool in detail.
What Is the SquirrelWaffle Malware? 5 Tips to Stay Protected
A piece of malicious software, SquirrelWaffle is designed to cause chain infections. Let's learn more about this vicious malware.
How to Set Up a Secure Home Network
Learn how to set up your home network securely, keeping your devices and data safe at all times.
Can Stalkers Track You Using Apple AirTags?
Apple AirTags are great at tracking your misplaced belongings, but they might be giving stalkers a chance to track you as well.
What Is Typosquatting? How to Protect Yourself Against It
A form of URL hijacking, typosquatting targets people who accidentally mistype a website address into the browser.
How to Activate Tamper Protection in Windows Defender (and Why You Should)
The tamper protection feature in Windows 11 now provides improved ransomware protection. Learn how to activate it now.
Is Your Ring Doorbell Invading Other People's Privacy?
While a Ring doorbell is great for your security, it might be invading your neighbor's privacy.
What Is Cybercrime? Online Crimes Explained
Cybercrime exploits technology to carry out illegal activities, but how does it work and what forms does it take?
How to Track A Stolen Device Through Dropbox
Have you lost your device or had it stolen? There could be a way of finding out who has it, if you already have Dropbox installed...
How to Remember Passwords Without a Pen and Paper
Weak and stolen passwords are the number one reason behind data breaches. Learn how to remember your passwords securely.
7 Ways a Criminal Can Use a Credit Card Skimmer Against You
Even with security chips and advanced biometric features in place, credit card data can be stolen through stealthy credit card skimmers.
Apple Tackles App Store Scams With New "Report a Problem" Button
Amid the growing App Store scams and negative publicity, Apple has restored the option to report suspicious apps.
Internet Safety: 50+ Tips to Keep Your Kids Safe Online
Children are prime targets for online predators and cyberbullies. These handy tips can teach parents how to keep them safe online.