Security

Search Encrypt isn't what it seems, so here's how to get rid of it: Header image
Online privacy is a major issue these days, and many apps, software, and extensions promise to keep your data safe. From VPN providers to private browsers and ad blockers, it’s hard to keep...
Sep 18, 2023
6 min read
Is your Messenger hacked? Here's how to tell and what to do: Header image
The thought of getting hacked on Facebook Messenger can be disturbing. And if your app has been acting up or you’ve been noticing messages you don’t recall sending, it’s possible that your Messenger...
Sep 11, 2023
5 min read
Adaware Web Companion: What it is and how to get rid of it: Header image
Imagine turning on your Mac only to discover that your browser has become irritatingly sluggish and throwing up unsolicited ads here and there. Or that the processing speed has slowed noticeably. This could...
Sep 7, 2023
4 min read
"Your Mac is infected!" How scareware works and how to get rid of it: Header image
Have you ever been browsing the internet when suddenly a pop-up came out of nowhere telling you in bold that your computer was “infected”? Or have you ever come across a site that...
Sep 4, 2023
7 min read
What is whaling? Here's how hackers catch the big fish (Header image)
It’s a well-known fact that when fishing, you maximize your chances by casting a wide net. On the other hand, if you’re hoping for bigger fish, the best tool is a spear. In...
Aug 29, 2023
5 min read
Is Spyrix malware? Everything you need to know about the keylogger: Header image
As the post-pandemic world continues to adopt remote and hybrid work models, employers are seeking ways to keep an eye on their staff when they aren’t physically present in the office. This can...
Aug 25, 2023
4 min read
What are botnet attacks? Everything you need to know about bot networks: Header image
Botnets have been around since the early days of the internet and remain one of the world’s most threatening cybersecurity issues. A cyber botnet has only one basic requirement: an internet connection. Once...
Aug 17, 2023
7 min read
What is NanoCore, and how does this malware work? Header image
Despite being created about ten years ago, NanoCore is one of the most popular, effective, and dangerous remote access trojans (RAT). But what exactly is NanoCore? Why is it still relevant? And what...
Aug 15, 2023
5 min read
What is Bad Rabbit? Understanding the 2017 ransomware attack (Header image)
The first ransomware attack was registered in 1989. Back then, attackers encrypted files and held them hostage in exchange for payment that had to be mailed to a P.O. box. It was not...
Aug 4, 2023
5 min read
How to get a secure Wi-Fi connection at home and in public (Header image)
The Wi-Fi icon has become a symbol of instant connectivity. But just as you can easily connect to wireless networks, so can hackers, as most Wi-Fi networks are open and unsecured. In this...
Jul 31, 2023
6 min read