Featured Blogs
Solving the Gamer’s Dilemma: Security vs. Performance
As of last year, 2.2 billion1 people consider themselves gamers across the globe. Of that 2.2 billion, over 50% – 1.22...
Are Cash Transfer Apps Safe to Use? Here’s What Your Family Needs to Know
I can’t recall the last time I gave my teenage daughter cash for anything. If she needs money for gas,...
Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt
Buying a car can be quite a process and requires a lot of time, energy, and research. What most potential...
How To Practise Good Social Media Hygiene
Fact – your social media posts may affect your career, or worse case, your identity! New research from the world’s...
Iron Man’s Instagram Hacked: Snap Away Cybercriminals With These Social Media Tips
Celebrities: they’re just like us! Well, at least in the sense that they still face common cyberthreats. This week, “Avengers:...
How Visiting a Trusted Site Could Infect Your Employees
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple...
Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study
Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the...
3 Things You [Probably] Do Online Every Day that Jeopardize Your Family’s Privacy
Even though most of us are aware of the potential risks, we continue to journal and archive our daily lives...
Attention Facebook Users: Here’s What You Need to Know About the Recent Breach
With over 2.4 billion monthly active users, Facebook is the biggest social network worldwide. And with so many users come...
iPhone Users: Here’s What You Need to Know About the Latest iOS Hacks
iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently...