ALL POSTS This Android vulnerability can break your lock screen in under 60 seconds Pieter Arntz March 12, 2026 0 Comments Researchers showed how attackers could pull encryption keys, recover the PIN, and access sensitive data from affected devices. Microsoft Authenticator could leak login codes—update your app now Pieter Arntz March 12, 2026 0 Comments A bug in Microsoft Authenticator on Android and iOS could allow malicious apps on the same device to intercept authentication codes or sign-in links. Meta rolls out anti-scam tools across WhatsApp, Facebook, and Messenger Danny Bradbury March 12, 2026 0 Comments New AI-powered protections aim to detect impersonation attempts, suspicious friend requests, and scam messages. Phishers hide scam links with IPv6 trick in “free toothbrush” emails Pieter Arntz March 11, 2026 0 Comments United Healthcare impersonators are using an IPv6 trick to hide the real destination of phishing links in emails promising free Oral-B toothbrushes. Sextortion “I recorded you” emails reuse passwords found in disposable inboxes Pieter Arntz March 11, 2026 0 Comments “You pervert, I recorded you!” sextortion emails include real passwords harvested from public temporary email inboxes. Watch out for tax-season robocalls pushing fake “relief programs” Pieter Arntz March 11, 2026 0 Comments Scammers are targeting Americans with robocalls during tax season. Here’s how to spot the scam. March 2026 Patch Tuesday fixes two zero-day vulnerabilities Pieter Arntz March 11, 2026 0 Comments Microsoft patched 79 security vulnerabilities this month, including bugs that could let attackers escalate privileges or crash critical services. How to see your Google Search history (and delete it) David Ruiz March 10, 2026 0 Comments Google knows a lot about you. Here's how to check your Google Search history and how to prevent future tracking. Signal and WhatsApp accounts targeted in phishing campaign Pieter Arntz March 10, 2026 0 Comments Dutch intelligence warns that attackers are hijacking Signal and WhatsApp accounts by tricking users into sharing verification codes or linking a malicious device. Previous 1 … 7 8 9 10 11 … 617 Next Contributors Threat Center Podcast Glossary Scams