Like most people I check my emails in the morning, wading through a combination of work requests, spam and news alerts peppering my inbox. But yesterday brought something different and deeply disturbing. I noticed an alert from the American Cybersecurity and Infrastructure Security Agency (CISA) about some very devious malware that had infected a network of computers. The […] … learn more→
Blog Archives
It’s being called Russia’s most sophisticated cyber espionage tool. What is Snake, and why is it so dangerous?
Voice deepfakes are calling – here’s what they are and how to avoid getting scammed
You have just returned home after a long day at work and are about to sit down for dinner when suddenly your phone starts buzzing. On the other end is a loved one, perhaps a parent, a child or a childhood friend, begging you to send them money immediately. You ask them questions, attempting to […] … learn more→
What is a password manager and how does the LastPass data breach affect users?
LastPass, one of the most widely used password managers, has admitted in recent weeks that the security breach it suffered during the summer has affected its users’ data. This means that the passwords of ordinary citizens, their emails, their banks, their digital wallets, everything, have ended up in the hands of criminals. Although, in principle, encrypted. The fact has […] … learn more→
How to choose a good password?
As cyberattacks increase, each of us can potentially be confronted with them. Of course, we all have our tricks for the passwords we use on our computers and laptops: hidden under a keyboard, written on a piece of paper or taken from the birthday of the youngest. But how do you ensure that your password is […] … learn more→