Internet Users
Instructions
Fake online shop offers run the risk of customer data
At first glance, fake online shop look like other regular ones. However, behind the bargains are scammers who try to rip off their customers...
editor -
Instructions
FBI and NSA warn in a joint report about the previously unknown Linux malware
The NSA has published some details about an undiscovered Linux malware that is currently used by a Russian intelligence service for targeted attacks.
The US...
editor -
Instructions
Expired root certificate from Sectigo leads to errors in many cases
The AddTrust External Root certificate expired last Saturday. This was planned, but due to an incorrect implementation, some clients continue to try to build...
editor -
Business
Why email security should be a business priority
Did we really understand the importance of email security? Cyber security experts provide a few reasons why email security should be a business priority.
Email...
editor -
Instructions
What to do if your own social media account has been hacked?
Social media accounts such as Facebook and Twitter are a common target for cyber criminals. These accounts contain lots of personal and confidential information...
editor -
Instructions
Chrome 83 focuses on data protection and security for other innovations
The new Chrome version 83 removes several gaps in the browser. Google’s developers have also included a few new features. This includes the reluctance...
editor -