Reading Time: 2 minutes Last time, I highlighted the drawbacks of AirTags as they can be used to track an unsuspecting individual. It seems there is even more to worry about because hackers can use AirTags to steal your account. The worst part is that this cyberattack takes place when you find a lost
Reading Time: 4 minutes It’s clear that cybercriminals prowl the internet like hyenas hunting for their next meal. One of the ways that they cause distress to victims is by hacking computer systems. In this article, we look at the uses of a hacked computer so that you know how valuable your device is
Reading Time: 3 minutes Cybercriminals usually come up with deceptive tactics to attack unsuspecting victims. Even mobile accessories can be booby-trapped to deliver a payload when connected and it’s something to watch for if you use aftermarket phone accessories. Amongst the attack hardware is a new malicious lightning cable that can hack iPhones from
Reading Time: 6 minutes As an internet user, it is important that you actively monitor your online accounts to make sure that they have not been hacked. In this article, I look at what to do when you’ve been hacked and an attacker has complete control of your account. Security of your email accounts
Reading Time: 4 minutes Can hackers see you through your webcam? It is scary to know that a stranger can be watching you while you innocently browse the internet. Although we have singled out computer webcams in the attack, this also occurs on any device that has a camera and access to the internet.
Reading Time: 3 minutes Hacking of Zoom is more frequent than you thought In this article, we look at ways to stop Zoom hacking and block unauthorized participants. In early 2020, more than 500,000 Zoom passwords were found on the dark web, going for less than a cent each. In some cases, the passwords were