What threats are you missing?

Are traditional security methods enough?

Stay up to date with the SecureValue Blog

Most Recent Articles

How to Explain Loot Boxes and In-Game Purchases to Kids

Have you ever wondered why your child keeps asking for money to buy things in their favorite game? If so, you’re not alone. Many parents find themselves caught off guard by the world of loot boxes and in-game purchases.  

Loot boxes and in-game purcha…

WhatsApp Patches Zero-Click Spyware Attack Vector on Android

WhatsApp has addressed a vulnerability used in mercenary spyware attacks on high-profile targets.

The Citizen Lab has published an investigation into the Israeli developer of surveillance software, Paragon Solutions, “to untangle multiple threads conn…

The TikTok Blackout Challenge: How to Protect Children

The TikTok Blackout Challenge, also known as the “choking game” or “pass-out challenge,” is a highly dangerous trend that involves cutting off oxygen to the brain to induce a brief, euphoric sensation. Participants often choke themselves or have someon…

Supply-chain CAPTCHA attack hits over 100 car dealerships

A security researcher has discovered that the websites of over 100 car dealerships have been compromised in a supply-chain attack that attempted to infect the PCs of internet visitors.

As researcher Randy McEoin explains in a blog post, cybercriminals…

The Safety of Data in the Cloud

This article looks at the safety of your business data in the cloud, focusing on the Microsoft cloud ecosystem and the challenges businesses face with security, vendor overdependence, and managing multiple tenants.
The post The Safety of Data in the Cl…