Blog

How to Spot Hidden Malware on Your Devices

Malware is malicious software that can cause damage on your computer, phone or tablet. It can make[…]

How to Minimise, or Even Better, Avoid Ransomware Damage

Ransomware has now become a big problem for many people and businesses. It can lock up your files[…]

Cyber Security

M2: Inadequate Supply Chain Security

Came here from a direct link? Jump to the start of our OWASP Mobile Top 10 series[…]

Obiquitech Cyber Hygiene Tips for 2025

How is Your Cyber Hygiene – Essential Tips for 2025

Cyber hygiene is super important. It’s like brushing your teeth but for your online life. Good cyber[…]

What is Threat Exposure Management (TEM)?

Threat Exposure Management (TEM) is an important cybersecurity tool. It helps organizations find and fix weak spots[…]

How Password Managers Protect Your Accounts

Passwords unlock our digital lives. We use them for email, bank accounts, and more. Remembering all these[…]

Innovative Solutions to IoT Security

The Internet of Things is growing day by day. More devices are connecting to the internet. And[…]

Do You Really Need Dark Web Monitoring?

The dark web is a hidden part of the internet. You can’t find it with Google. You[…]

Cyber Security

M1: Improper Credential Usage

A new addition to the 2024 list, this refers to the hard coding of credentials within source[…]

Cyber Security

OWASP Mobile Top 10 – Overview & Comparison

Back in May 2024 the final version of the updated OWASP Mobile Top 10 security threats was[…]