Quantcast
Channel: Vulnerabilities | NordVPN
Browsing all 23 articles
Browse latest View live

The 20 best hacker movies of all time

Stories about hacking have tickled the fancy of scriptwriters even before the invention of the World Wide Web. Filmmakers around the world have been portraying the hacker community for decades. From...

View Article


Nollapäivähaavoittuvuudet, -hyökkäykset ja niiden hyödyntäminen: Kaikki mitä...

Useimmilla sovelluksilla voi olla ohjelmistovirheitä, mutta mitä jos ohjelmistovirheet avaisivatkin takaoven hakkerille? Tilanne olisi pahin, jos kehittäjät eivät ole tietoisia tästä...

View Article


Loyalty program fraud: Everything you need to know

We don’t typically associate loyalty programs with high fraud risk because they rarely involve money transactions. However, loyalty programs can create the perfect space for hackers to snatch your...

View Article

Paypal-Betrug: Wie erkennt und vermeidet man ihn?

PayPal-Phishing-Betrug gibt es schon seit Jahren, und es scheint, dass die Kriminellen nicht vorhaben, in nächster Zeit damit aufzuhören. Sie schicken dir eine betrügerische E-Mail und verleiten dich...

View Article

What is a zero-day exploit, and why are they dangerous?

Most software has had a bug at some point. But what if that bug has the potential to open backdoors for hackers to exploit? Worse still, what if the developers of the software have no idea the...

View Article


ゼロデイ脆弱性:その定義と事例を紹介

...

View Article

What is data hoarding, and what risks does it pose?

Data hoarding takes many forms, from storing digital assets with potential value to accumulating useless data that only induces stress. So, what exactly is data hoarding, and what consequences can it...

View Article

Was ist Cross Site Scripting (XSS): Angriffsarten und potenzielle Risiken

Cross-Site-Scripting (XSS) ist ein Cyberangriff, bei dem Kriminelle schädlichen Code in eine Webseite oder Anwendung einschleusen. Dies zielt darauf ab, Logindaten und andere sensible Infos zu...

View Article


Wat is sextortion en hoe blijf je veilig?

Sextortion is een vorm van cyberchantage waarbij de afperser naaktbeelden van het slachtoffer dreigt te verspreiden, tenzij deze losgeld betaalt of ermee instemt meer privéfoto’s of video’s te delen....

View Article


Hört mein Handy mit? Wie kann man das verhindern?

Hast du schon mal vermutet, dass dein Telefon mithört? Vielleicht hast du bemerkt, dass sich deine Facebook-Anzeigen geändert haben, nachdem du in einem Gespräch etwas erwähnt hast. Vielleicht hast du...

View Article

Do banks refund scammed money? Means of recovery and tips for scam prevention

Losing money to scammers is a painful experience. But sometimes, not all is lost. While no bank or federal service can remove the frustration or disappointment of getting duped, they can sometimes...

View Article

How to spot and report a Bank of America phishing email

If you encounter a Bank of America phishing email, it is critical to take immediate action to secure your account and data. Keep alert to recognize warning signs of phishing emails, identify common...

View Article

Cybersecurity threats: Main types and new threats in 2024

The more reliant we become on digital devices and the internet, the more we are at risk from cybersecurity threats. Understanding the dangers you face in cyberspace is the first step to protecting...

View Article


Log4Shell: The Log4j vulnerability explained

Log4Shell is a software vulnerability in Log4j, a Java-based logging utility. This security flaw allows cybercriminals to compromise systems by injecting malicious code, threatening millions of...

View Article

Image may be NSFW.
Clik here to view.

Charmsearching: What it is and how to remove it

If you’ve ever been redirected to Charmsearching.com while browsing the internet, then some adware may have made its way into your browser. While that may sound concerning, don’t worry — in this...

View Article


Is CCSPayment a scam? Legitimacy of debt collectors

You’ve likely heard your fair share of debt collection scam stories or shady debt repayment schemes. With these schemes being quite common, getting a written notice from a collection agency like...

View Article

Attacco ransomware: cos’è e come funziona?

Tramite un attacco ransomware, i criminali informatici riescono a bloccare l’accesso ai tuoi dati, chiedendo un pagamento in denaro come riscatto per consentirti di riottenerne il controllo....

View Article


What is conhost.exe, and is it dangerous?

At first glance, the file name “conhost.exe” may strike you as suspicious or scammy. And when you see “.exe” next to it (which stands for executable file), the uncertainty only grows. Is it a virus?...

View Article

What is Boardsi, and is it a scam or legit?

If you’re looking for opportunities to serve on a corporate board, Boardsi is a platform you may have come across. At first glance, Boardsi looks like a promising opportunity for executives ready to...

View Article

Image may be NSFW.
Clik here to view.

10 common Black Friday scams: How to identify and avoid them

While Black Friday is a great day to kick off the holiday shopping season, it’s also a perfect opportunity for scammers to use your enthusiasm to try to steal your money. Or even worse, perform...

View Article
Browsing all 23 articles
Browse latest View live