1073 articles
At Mobile World Congress 2019, our experts presented a study on the security of Motorica smart artificial limbs.
Crooks hacked telecom protocol SS7 to steal banking two-factor authentication codes.
The Razy Trojan secretly installs malicious extensions for Chrome and Firefox to serve phishing links and steal cryptocurrency.
A huge database of leaked e-mails and passwords surfaced in the Internet. Here’s what you should do about it.
50,000 printers worldwide suddenly printed a leaflet in support of youtuber PewDiePie. How can you protect your printer from hackers?
The winter sales season is the hottest time of the year for shoppers and financial phishers. Be careful!
Twitter cryptocurrency scams are becoming more and more advanced and convincing, with scammers using new techniques and some heavy artillery.
One short message is enough to send a Sony PS4 into an infinite restart loop. Here’s how to deal with it.
The “another friend request from you” hoax on Facebook is gaining traction. Don’t fall for it.
Facebook has been breached, and malefactors gained access to some 50 million accounts. We offer some quick tips for your safety.
Which is older, the phone or the fax? Is it true that no one faxes anymore? And can a fax machine be hacked? (Spoiler: yes)
Fortnite for Android is not available on Google Play. We explain how to download and install it properly, and what else to do to stay safe.
WhatsApp for Android can back up your chats to Google Drive. It’s free, but it may hurt older backups. Here’s how to get it right.
How a seemingly harmless Android application can infect your smartphone using shared external storage.
Are the IoT’s security issues placing the industry on the road to a litigation nightmare?
Almost half of the most-visited websites open visitors to potential dangers. What can you do?
When it comes to online accounts, voicemail is a major security hole. Here’s why.
KeyPass ransomware is infecting computers worldwide, encrypting almost everything in its path. And it all starts with downloading a seemingly innocuous installer.
How security researchers were able to track down cryptocurrency bots on Twitter.