How to protect accounts on Steam, Origin, Epic Store, and other such services.
Common cybercriminal tricks for hijacking Office 365 accounts.
On this podcast, Dave and Jeff look at why Israel is using fish to fight hackers, why Google will pay for you to read news and how Facebook helped the FBI hack Tails OS.
An integrated approach arms even small companies with automated tools that repel complex attacks.
A few stories about how easy it is to accidentally leak sensitive information into the public domain.
At WWDC 2020, Apple rolled out App Clips for iOS. We explain what that — as well as Android Instant Apps — is.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Dave and Jeff discuss the underground trade of pirated OnlyFans porn, World of Warcraft bots, an alleged arsonist’s public posts getting her nabbed by the FBI, and more.
Zoom developers have made their service more secure. We review what’s changed.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Our experts uncovered a scheme to extract cardholder data using Google tools.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
To protect ADAS from external interference, cars need a special approach to cybersecurity.
Common attack schemes targeting SMB employees.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
We tell how the coronavirus scare is being exploited by phishers to attack companies and install malware.
The coronavirus outbreak has forced many office employees to remain at home. Here’s what you need to keep in mind so that both you and the company stay protected.
How can you make your parents secure, technologically speaking? By setting up protection remotely, without visiting them.
How are criminals able to hack ATMs and get away with money? Here are four videos that show how ATMs can be vulnerable.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
We investigated three cases of ATM robbery — involving remote-controlled malware, a Bluetooth keyboard, and a drill.
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
How to protect your Instagram account and personal photos from prying eyes.
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
No PIN on your phone? Pickpockets will thank you for that.