How to protect legacy IT systems
Legacy systems continue to toil away in embedded solutions, medical equipment, and precision instruments. How can the respective security risks be mitigated?
Legacy systems continue to toil away in embedded solutions, medical equipment, and precision instruments. How can the respective security risks be mitigated?
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
How to secure chats on your phone, and why encryption alone is not enough
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
How did scammers pull off a MitM attack and 2FA bypass in… 1915?!
Discussing privacy in Threads, and whether you should sign up to Zuckerberg’s Twitter clone.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.
Received an attractive job offer from a stranger? Be careful! It could be a scam…