The other day, my tween daughter leaned in and whispered, “Six-seven.” At first, I thought I’d misheard her. “What did you say?” “Six-seven,” she repeated, this time with a mischievous grin and a dramatic little hand gesture for extra flair. “What’s that supposed to...
IBM® MaaS360® is upgrading and enhancing the mobile app experience by upgrading from the web-based IBM® MaaS360® App Catalog to the native Enterprise IBM® MaaS360® App Catalog for iOS and iPadOS devices (15.0 or later). This upgrade provides users with a more seamless...
‘Fear is the mind-killer.’ The timeless line from Dune captures a truth that both psychology and cybersecurity know well: fear paralyzes logic. When panic takes over, we’re less able to think critically or make rational decisions. And that’s precisely what scammers,...
Hackers breached the systems of Kido, a chain of London-based nurseries, and stole data and photographs of around 8,000 children, bringing to life the parents' worst nightmare – that of having the images of their kids out in the wild and possibly on the Dark Net.
If you’ve ever wondered how someone could lose access to their WhatsApp account in a matter of seconds, the answer lies in cleverly crafted scams. Cybercriminals don’t need advanced malware or sophisticated hacking tools — instead they exploit trust, urgency, and...
Ransomware in 2025 is a paradox. On the one hand, attacks are rising again, fueled by automation, AI-enhanced phishing, and increasingly targeted tactics, especially those targeting multiple endpoints. The post What 2025 Teaches Us About Ransomware and the Future of...