A recent surge in tech support scams show that this particular method of coercion is still thriving. New tactics and avenues of attack deceive people who are more familiar with the traditional techniques. Find out how to spot and manage these scams.
A number of high-profile social media account hacks demonstrate the importance of secure passwords—and why everyone should enable two-factor authentication on their online accounts. Here's how to do it.
Need to know what ransomware is all about? How can ransomware infect your system, or how to prevent ransomware from entering your network? Here are some of the most frequently asked questions on the topic.
Various business websites were recently hijacked to deliver crypto-ransomware to visitors. Why do attackers repeat the cycle of compromising legitimate websites via exploit kits, malware and vulnerable software?
Attackers know that sports enthusiasts are more susceptible during the rush and excitement around major events. Here are a few tips to make sure you enjoy a threat-free experience during the 2016 summer games.