The NSA advises you to turn your phone off and back on once a week – here’s why | ZDNET

That pricey and precious smartphone you carry with you can be hit by a host of security threats, from phishing to malware to spyware. All it takes is one successful attack to clobber your phone and compromise your data and even steal your identity. So, how do you protect yourself?

Cybercriminals pose as “helpful” Stack Overflow users to push malware

This approach serves as a reminder of the constantly changing tactics of cybercriminals and, unfortunately, illustrates why you can never blindly trust what someone shares online.

What is spear phishing? Examples, tactics, and techniques | CSO Online

Spear phishing messages are crafted with care using social engineering techniques and are difficult to defend against with technical means alone. And they’re ruthlessly efficient.

You’re missing a lot if you haven’t used these 10 Google Docs templates

Whether you want to create a resume, invoice, software development proposal, or even a menu card for your new restaurant, the templates below should help you get a head start when struggling for inspiration when sitting at your laptop.

Hackers phish finance orgs using trojanized Minesweeper clone

Hackers are utilizing code from a Python clone of Microsoft’s venerable Minesweeper game to hide malicious scripts in attacks on European and US financial organizations.

How to master the Windows Command Prompt — The ultimate command line cheat sheet

The terminal is a bit of a hurdle when you’re getting started with Linux, but it’s a very powerful tool that’s faster than the GUI (graphical user interface) in some cases. Windows has its own terminal — the Command Prompt. While PowerShell is the more advanced and sophisticated version of Command Prompt, the latter is still great if you want to learn the ins and outs of using the terminal.

Phishing statistics that will make you think twice before clicking – Help Net Security

This article includes excerpts from various reports that offer statistics and insights into the current phishing landscape.

YouTube Becomes Latest Battlefront for Phishing, Deepfakes

YouTube has turned into a new front for malicious actors to deploy phishing, other malware, and bogus investment schemes, according to a report from researchers at security vendor Avast.

PC user annoyed about Task Manager jumping around gets told how to fix it with one button—by the developer that built the application 30 years ago | PC Gamer

Do you get frustrated when you’re trying to track down an application in Task Manager and the list is constantly shuffling around? Loads of people do, and that’s why the developers at Microsoft added a shortcut to prevent it happening. Simply hold down the Ctrl key and everything freezes in place.

How to know if your computer got hacked, what to do next | Fox News

Have you ever had that sinking feeling that something’s not quite right with your computer? Maybe it’s running slower than usual or there are new icons on your desktop that you don’t recognize. Well, you might not be just imagining things; you could have been hacked