Category : Security

Zoom Scam Threatens You with Being Fired: What to Do Now

Zoom Scam Threatens You with Being Fired: What to Do Now

A cruel new phishing scam arrives in your mailbox reminding you of an "emergency" company zoom meeting that starts in a few minutes. Why should you at...

mac under Attack by North Korean Spies — How to Protect Yourself

mac under Attack by North Korean Spies — How to Protect Yourself

Remember those lovely North Korean hackers who destroyed Sony Pictures' computers, spread the WannaCry ransomware worm around the world, and stole $10...

Proton VPN Android App now helps you avoid censorship

Proton VPN Android App now helps you avoid censorship

ProtonVPN, a Swiss VPN provider, has enabled a "smart protocol" feature in its Android app that allows users to automatically switch between VPN proto...

Zoom is getting its biggest missing feature

Zoom is getting its biggest missing feature

Today (May 7), Zoom CEO Eric S. Yuan announced the acquisition of Keybase, a New York startup offering encrypted messaging, file sharing, and file sto...

Android Spyware gives attackers complete control of Your Phone: What to Do

Android Spyware gives attackers complete control of Your Phone: What to Do

A newly discovered strain of multi-step Android spyware has been lurking in the background since 2016, infecting tens of thousands of users, but will ...

900 Million easyJet Customers Hit By Data Breach: What to Do Now

900 Million easyJet Customers Hit By Data Breach: What to Do Now

Cybercriminals stole the personal information of 9 million customers, including 2,200 credit card numbers, from British budget airline easyJet, the ai...

How to Enable 2FA in Epic Games Store

How to Enable 2FA in Epic Games Store

The Epic Games store has seen a huge influx of new users due to the free Grand Theft Auto V offer. But if you want GTAV or any of the other free items...

Nasty Bluetooth Flaw Hits Billions of Devices — What to Do Now

Nasty Bluetooth Flaw Hits Billions of Devices — What to Do Now

A flaw in an older version of the Bluetooth protocol allows hackers to pair their devices with yours. Affected devices include, but are not limited to...