
Navigation at sea: How we found our way a long time ago, and how we do it now
How do we pinpoint our location at sea nowadays, and how did ancient seafarers navigate the open seas before the common era and during colonization?
3964 articles
How do we pinpoint our location at sea nowadays, and how did ancient seafarers navigate the open seas before the common era and during colonization?
Millions of user logins for Tumblr and MySpace stolen, up for sale.
Research shows that nearly 40% of people rate their smartphone at least as important as their close friends. And one man recently even married his phone!
Although the history of Microsoft Windows XP seemed to end in April 2014, the operating system was not completely gone; many embedded devices still ran Windows XP Embedded Service Pack 3, and as such they were dependent on its security updates.
Ransomware is a tough nut to crack — and while it’s distracting you by encrypting your files, it may also be turning your computer into a zombie.
Hospital pays ransomware ransom, does not get files back.
Charging your smartphone’s battery over USB can be dangerous: Thieves can steal your files, infect your smartphone with something nasty — or even brick it.
One of the most popular techniques used to penetrate corporate defenses is the use of vulnerabilities found in working software, which, in fact, do not need to be brand-new 0-days.
So you just paid for tickets to the Olympics, and now you’re planning your trip to Rio de Janeiro? Check that ticket twice: you may have been scammed.
A look at recent survey results on awareness of ransomware in North America.
At the recent I/O 2016 conference Google announced Android N, Wear 2.0, new messenger Allo, voice assistant Google Home, and a laundry list of other tech miracles. What about security?
Kaspersky Lab RakhniDecryptor utility updated to help decrypt files encrypted by previously invincible versions of TeslaCrypt.
In a highly surprising move, the notorious Teslacrypt authors have wrapped up their operation and released the ransomware’s master key.
Researchers expose details of 70,000 OKCupid accounts, without permission.
All files encrypted with TeslaCrypt ransomware can now be decrypted … thanks to its creators
Old LinkedIn data is being sold on the darkweb. Time to change your password!
The Petya ransomware installer now includes another ransomware called Mischa that complements it.
Criminals behind the ATM Infector campaign are turning ATMs into invisible skimmers.
Suddenly in an instant I became an outsider in the system. While I was being ‘fixed’, I had an opportunity to think about it and now I can sharee my thoughts with you.
The late April was especially “rich” with news related to bugs, attacks and Android-targeting malware.
An update to RannohDecryptor now allows to beat a newer version of CryptXXX too.