What threats are you missing?
Are traditional security methods enough?
Stay up to date with the SecureValue Blog
Most Recent Articles
In December last year, we reported how the email and mailing addresses of some 270,000 Ledger customers had been published on a hacking forum following a data breach. At the time we warned users of the hardware cryptocurrency wallet to watch out for phishing scams that might attempt to steal users’ credentials. What we hadn’t […]
Microsoft will retire the Windows 10 operating system on October 10, 2025. It’s the first time the company puts an expiration date on its current operating system, paving the way for its successor, Windows 11. It’s a big deal when an operating system reaches end-of-life because it essentially means that its maker no longer issues […]
Online scammers use the name of international shipping company UPS to dupe consumers into participating in a survey giveaway scam. The scam, recently spotted by Bitdefender Antispam Lab, guarantees recipients a Sony PlayStation 5 gaming console in return for completing the online survey on behalf of UPS. Fraudsters use traditional clickbait tactics such as “Participate […]
Our mobile devices are not just a means to communicate with others. They’ve evolved into a data storage device, a video and sound recorder, as well as an easy way to access our bank accounts. Mobile security is often overlooked by many technology users, who dismiss the reality of security risks brought by careless interactions […]
Enhancements A new option in the Spam and Malware Protection module emails from the selected domain be sent exclusively through our infrastructure. For this purpose, email sending is restricted to our relay IPs. Regular expressions can now be used to define filter rules in the “Compliance Filter” module. Changes to the “Out of Office” notes […]
Apple has announced some innovations for iOS 15 are a cause for concern among victims of abuse and organizations that support survivors. Among other things, it will be possible to locate devices that are switched off. This is a disaster for people who…
Consumers are sometimes skeptical about warnings that smartphones face just as many security threats as regular computers. While some security experts might seem over-zealous shouting about the dangers, the vast majority of warnings about mobile security threats are indeed justified. Just because our phones are not tethered physically to a network doesn’t mean they’re safe […]
There has been a lot said about data scraping. Here is a breakdown of what it is, why it might be problematic and how we might deal with it going forward.