Kell van Daal
How to Keep Your Crypto Wallet Safe
Author: Kell van Daal Rising Crypto Exchange Rates = Rising Threats Though Bitcoin’s value has...
Smart TVs Require Even Smarter Security Measures
Smart TV Dilemmas It's hard nowadays to find a TV that is not "smart". They all come preloaded with...
Easy as PyPI Pie
Recently PyPI suspended new user sign-ups as well as new project registration, citing the volume of...
Why We Still Haven’t Learned from the Target Data Breach Years Later
The threat actor’s methodology wasn’t unique — they used a six-step approach that can be mapped...
Protecting Yourself from Malicious Browser Extensions
Browser extension-based malware can range from annoying to catastrophic, but following these tips...
Defeating Malvertising-Based Phishing Attacks
Malvertising Enters a New Age While Google grapples with the potential threat that ChatGPT poses to...
Threat Actors Are Using Google Ads to Launch Phishing Attacks
Year after year, phishing tops the list of the leading causes of data breaches. Afterall, a threat...
Which Protective DNS Keeps You Safest From Cyber Threats? (Part 2)
In a previous blog, we shared the results of a comparison test that pitted HYAS Protect against...
Putting an End to Emotet: Measuring the Efficacy of Protective DNS
We compared HYAS with other top protective DNS providers to find out which one was able to detect...
Which Protective DNS Provider Keeps You Safest from Malware?
We conducted tests using real-world malicious domains to evaluate the efficacy of HYAS Protect,...