Why Is Ransomware Such a Big Threat to Universities?
Ransomware poses a significant threat to universities. But why is this the case, and how can you protect yourself?
What Is Shadow IT and How Can You Manage Security Threats?
Unmonitored tools can be both good and bad for a workplace. Here's what shadow IT is and how you can manage the potential threats to your business.
What Is PhotoDNA and How Does It Work?
How do companies monitor for child abuse? Firms like Facebook use PhotoDNA to maintain user privacy while scanning for abusive images and videos.
Evil Corp: A Deep Dive Into One of the World’s Most Notorious Hacker Groups
Evil Corp has carried out several sophisticated attacks since it first burst onto the online scene. But just how dangerous are they?
At Home and in the Office? How to Work Securely in a Hybrid Environment
Working in the office and off-site, like at home? Here's how employees and employers can maintain strong cybersecurity wherever they are.
Verizon's Quantum-Safe VPN: What You Need to Know
How do you maintain encryption if cybercriminals use quantum computing to decrypt data? Verizon might just have an answer...
6 Hobbies You Should Have if You’re Interested in Cybersecurity
Looking for a job in cybersecurity? Here are some great hobbies to build your skill set and prove you have what it takes.
Hackers Bribe Employees to Deploy Ransomware on Company Computers
Hackers are finding new ways to infiltrate businesses: using insiders to cripple companies using ransomware.
GoFundMe Scams: How to Identify Fake Fundraisers
Not everyone using fundraising sites like GoFundMe are as well-intentioned as you might expect. Here are some easy ways to spot a fundraising scam.
What Is the NIST Cybersecurity Framework?
When thinking about online security, the NIST cybersecurity framework is one of the most popular implementation choices. But what is it?
Has Ragnarok Ransomware Called It Quits?
A ransomware gang operating since 2019, Ragnarok is making the news again. But this time, maybe it's for the right reasons...?
How to Enable WireGuard on ProtonVPN
You can use WireGuard on ProtonVPN on Android, iOS, and Windows. Here's how to enable it on your device.
Here’s Why the FBI Issued a Warning for Hive Ransomware
The FBI issued a warning about a particularly nasty strain of ransomware. Here's why you need to be especially wary of Hive ransomware.
Dark Web vs. Deep Web: What's the Difference?
The dark web and deep web are often mistaken for being one and the same. But that's not the case, so what's the difference?
5 Surefire Things That’ll Get You Targeted by Ransomware
Ransomware is a serious threat to your online security, and doing these five things will increase the risk of an attack.
How to Restrict Sharing Options in Google Drive
Being able to control your file sharing options in Google Drive is an important part of security for your files. Here's how to do just that.
What Is Malware-as-a-Service?
Hackers can employ Malware-as-a-Service to make money and gain personal information. So what is MaaS? How can you protect yourself?
What Is Ryuk Ransomware?
Ryuk is unlike numerous ransomware iterations. Here's what you need to know about the malware that only targets critical functions.
Hackers Are Now Targeting Expired Driving Licenses: Here's Why
Get an email from the DMV saying your driving license has expired? It's a scam. Here's why expired or expiring licenses are a target for scammers.
How GitLab's Package Hunter Prevents Supply Chain Attacks
GitLab's latest tool can find malicious code in open-source projects. Here's how you can use Package Hunter to keep your CI/CD pipeline safe.