PWA phishing on Android and iOS – Week in security with Tony Anscombe
Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security...
Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security...
Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with...
Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme...
Convenience may come at a cost – such as when your favorite app reveals your exact coordinates to someone you’d rather keep at a distance...
Unsurprisingly, many discussions focused on the implications of the recent CrowdStrike outage, including the lessons it may have offered for bad actors...
In this high-stakes year for democracy, the importance of robust election safeguards and national cybersecurity strategies cannot be understated...