Install Guardio's Chrome extension to start your security checkup and scan for viruses, privacy violations and other browser threats.
"}}}},"allContentfulBlogPost":{"edges":[{"node":{"title":"AnyDesk Scams: The Good, the Bad, and the Risky","slug":"anydesk-scams-the-good-the-bad-and-the-risky","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/2mPkIVpLBumJ8NiBI0zz1N/67e43cd5e6bf5fcbaae13b9c2bcb7da0/Q3_Blog_cover_Anydesk_scams.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/2mPkIVpLBumJ8NiBI0zz1N/67e43cd5e6bf5fcbaae13b9c2bcb7da0/Q3_Blog_cover_Anydesk_scams.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/2mPkIVpLBumJ8NiBI0zz1N/67e43cd5e6bf5fcbaae13b9c2bcb7da0/Q3_Blog_cover_Anydesk_scams.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/2mPkIVpLBumJ8NiBI0zz1N/67e43cd5e6bf5fcbaae13b9c2bcb7da0/Q3_Blog_cover_Anydesk_scams.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/2mPkIVpLBumJ8NiBI0zz1N/67e43cd5e6bf5fcbaae13b9c2bcb7da0/Q3_Blog_cover_Anydesk_scams.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/2mPkIVpLBumJ8NiBI0zz1N/67e43cd5e6bf5fcbaae13b9c2bcb7da0/Q3_Blog_cover_Anydesk_scams.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/2mPkIVpLBumJ8NiBI0zz1N/67e43cd5e6bf5fcbaae13b9c2bcb7da0/Q3_Blog_cover_Anydesk_scams.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/2mPkIVpLBumJ8NiBI0zz1N/67e43cd5e6bf5fcbaae13b9c2bcb7da0/Q3_Blog_cover_Anydesk_scams.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/2mPkIVpLBumJ8NiBI0zz1N/67e43cd5e6bf5fcbaae13b9c2bcb7da0/Q3_Blog_cover_Anydesk_scams.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#080808","width":440,"height":199.99999999999997}},"tags":["Remote access scams","Tech Support scams","Anydesk scams","Anydesk"],"publishDate":"August 29th","body":{"childMarkdownRemark":{"timeToRead":12}},"description":{"childMarkdownRemark":{"excerpt":"Dive into this comprehensive guide covering everything from how these scams work to tips for keeping your bank accounts safe."}}}},{"node":{"title":"Facebook Hijacking: Recognize, React, and Guard(io)","slug":"facebook-hijacking-recognize-react-and-guard-io","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6JPOG2faFZM83Et7lshMkx/c84c37259228c75a95d33474ccecfa0b/Q3_Blog_cover_Facebook_hijacking.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6JPOG2faFZM83Et7lshMkx/c84c37259228c75a95d33474ccecfa0b/Q3_Blog_cover_Facebook_hijacking.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6JPOG2faFZM83Et7lshMkx/c84c37259228c75a95d33474ccecfa0b/Q3_Blog_cover_Facebook_hijacking.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6JPOG2faFZM83Et7lshMkx/c84c37259228c75a95d33474ccecfa0b/Q3_Blog_cover_Facebook_hijacking.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/6JPOG2faFZM83Et7lshMkx/c84c37259228c75a95d33474ccecfa0b/Q3_Blog_cover_Facebook_hijacking.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6JPOG2faFZM83Et7lshMkx/c84c37259228c75a95d33474ccecfa0b/Q3_Blog_cover_Facebook_hijacking.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6JPOG2faFZM83Et7lshMkx/c84c37259228c75a95d33474ccecfa0b/Q3_Blog_cover_Facebook_hijacking.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6JPOG2faFZM83Et7lshMkx/c84c37259228c75a95d33474ccecfa0b/Q3_Blog_cover_Facebook_hijacking.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6JPOG2faFZM83Et7lshMkx/c84c37259228c75a95d33474ccecfa0b/Q3_Blog_cover_Facebook_hijacking.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#f8f8f8","width":440,"height":199.99999999999997}},"tags":["Facebbok ","Facebook hacks","Facebook hijacking","online scams","Fraud","Identity theft"],"publishDate":"August 26th","body":{"childMarkdownRemark":{"timeToRead":16}},"description":{"childMarkdownRemark":{"excerpt":"Ever had a love-hate relationship with Facebook? You're not alone. Our blog explores how to spot the red flags of a hijacked account and avoid falling into the scam trap. We give you…"}}}},{"node":{"title":" The hidden flaws of 2FA : Are you really safe? 2FA scams","slug":"the-death-of-2fa-are-you-really-safe","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6JyakEnIcNFGNehLs3c58M/cc970b10e28d2ff0784ed9dc37b48878/Q3_Blog_cover_2FA_scams.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6JyakEnIcNFGNehLs3c58M/cc970b10e28d2ff0784ed9dc37b48878/Q3_Blog_cover_2FA_scams.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6JyakEnIcNFGNehLs3c58M/cc970b10e28d2ff0784ed9dc37b48878/Q3_Blog_cover_2FA_scams.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6JyakEnIcNFGNehLs3c58M/cc970b10e28d2ff0784ed9dc37b48878/Q3_Blog_cover_2FA_scams.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/6JyakEnIcNFGNehLs3c58M/cc970b10e28d2ff0784ed9dc37b48878/Q3_Blog_cover_2FA_scams.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6JyakEnIcNFGNehLs3c58M/cc970b10e28d2ff0784ed9dc37b48878/Q3_Blog_cover_2FA_scams.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6JyakEnIcNFGNehLs3c58M/cc970b10e28d2ff0784ed9dc37b48878/Q3_Blog_cover_2FA_scams.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6JyakEnIcNFGNehLs3c58M/cc970b10e28d2ff0784ed9dc37b48878/Q3_Blog_cover_2FA_scams.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6JyakEnIcNFGNehLs3c58M/cc970b10e28d2ff0784ed9dc37b48878/Q3_Blog_cover_2FA_scams.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#383838","width":440,"height":199.99999999999997}},"tags":["2FA","Two Factor Authentication","Multi Factor Authentication","MITM Attack","Phishing ","Guardio","Hardware Tokens","Security","Online Safety"],"publishDate":"August 19th","body":{"childMarkdownRemark":{"timeToRead":7}},"description":{"childMarkdownRemark":{"excerpt":"Explore the strengths and vulnerabilities of 2FA. Learn how cybercriminals exploit it and how to bolster your online security beyond just passwords."}}}}]}},"pageContext":{"slug":"what-is-adaptive-security-and-why-do-we-need-it","breadcrumb":{"location":"/what-is-adaptive-security-and-why-do-we-need-it","crumbs":[{"pathname":"/","crumbLabel":"Blog"},{"pathname":"/what-is-adaptive-security-and-why-do-we-need-it","crumbLabel":"what-is-adaptive-security-and-why-do-we-need-it"}]}}},"staticQueryHashes":["1614255152"]}