Phishing Scams of the Week: Crypto Cons, Fake Invoices, and Phone-Based Travel Traps
Note: All product and company names mentioned herein are for identification purposes only and are the property of, and may…
Note: All product and company names mentioned herein are for identification purposes only and are the property of, and may…
Tea, the woman-only dating advice app where users can anonymously rate and review men, has made quite a name for…
We know Nothing has style, but can it beat OnePlus' substance?
ICO cookie compliance crackdown Earlier this year, the ICO (Information Commissioner’s Office) announced its intention to tackle cookie compliance across…
ICO cookie compliance crackdown Earlier this year, the ICO (Information Commissioner’s Office) announced its intention to tackle cookie compliance across…
A newly discovered campaign dubbed GreedyBear has leveraged over 150 malicious extensions to the Firefox marketplace that are designed to…
Introduction In June, we encountered a mass mailing campaign impersonating lawyers from a major company. These emails falsely claimed the…
We might finally see the first iPhone browsers built on top of third-party engines now that Japanese regulators have taken…
A fundamental vulnerability within the HTTP/1.1 protocol poses a significant threat to millions of websites, potentially allowing attackers to execute…
SonicWall found no evidence of a new vulnerability after probing reports of a zero-day used in ransomware attacks. SonicWall investigated…