Mobile fraud on the rise in South Africa Security As South Africans take advantage of the ease and convenience… rooter January 1, 2026 1 min read 0
LinkedIn Job Scams Security Interesting article on the variety of LinkedIn job scams around… rooter December 31, 2025 1 min read 0
Using AI-Generated Images to Get Refunds Security Scammers are generating images of broken merchandise in order to… rooter December 30, 2025 1 min read 0
Are We Ready to Be Governed by Artificial Intelligence? Security Artificial Intelligence (AI) overlords are a common trope in science-fiction… rooter December 29, 2025 7 min read 0
Weekly Update 484 Security Presently sponsored by: Malwarebytes Browser Guard blocks phishing, ads, scams,… rooter December 28, 2025 1 min read 0
Friday Squid Blogging: Squid Camouflage Security New research: Abstract: Coleoid cephalopods have the most elaborate camouflage… rooter December 26, 2025 2 min read 0
IoT Hack Security Someone hacked an Italian ferry. It looks like the malware… rooter December 26, 2025 1 min read 0
Legacy FortiOS Bug Exploited to Bypass Authentication Security In the realm of cybersecurity, vulnerabilities are a constant concern,… rooter December 26, 2025 1 min read 0
Critical Security Alert! MongoDB RCE Flaw Could Allow Complete Server Control Security A high-severity vulnerability has been identified and addressed in MongoDB,… rooter December 26, 2025 1 min read 0
Verified Mark Certificates Are Driving the Next Phase of Banking Trust Security Emails are one of the most critical channels connecting with… rooter December 25, 2025 2 min read 0