Scammers with blue checkmarks on Twitter X
Fraudsters are buying blue checkmarks to impersonate well-known brands on X (ex-Twitter) and scam users.
59 articles
Fraudsters are buying blue checkmarks to impersonate well-known brands on X (ex-Twitter) and scam users.
We explore what Google Ad Topics is, how it functions, and how to disable it. Along the way, we discuss the related topics of Google FLoC, Privacy Sandbox, and the demise of third-party cookies.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
A few words on why desktop applications based on the Electron framework should be approached with caution.
Why the Windows system time can suddenly change, and how to stop it from happening.
We explain what OSINT is, why it has to be front-of-mind at all times, and how to guard against hackers using it.
Some thoughts on what PC software patches should be prioritized and why.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Gadgets to help protect employees’ devices against hackers and other threats.
Four threats you might face when using Airbnb, and tips for avoiding them.
Here’s how to set up Threads to make your profile both private and secure.
How social engineering helped hack the CIA chief, hijack Elon Musk and Joe Biden’s Twitter accounts, and steal half-a-billion dollars.
Discussing privacy in Threads, and whether you should sign up to Zuckerberg’s Twitter clone.
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
What web skimmers are, why you should keep a look out for them when shopping online, and how to protect yourself.
What two-factor authentication types are out there, and which ones should be preferred.
Which screen-locking method best protects your Android smartphone: PIN code, password, pattern lock, fingerprint, or face recognition?
A few tips on how to establish cybersecurity communications with employees.