
Data theft during smartphone charging
Can your photos be viewed, stolen, or deleted when your smartphone is plugged into a public charging station? As it turns out — yes!
Can your photos be viewed, stolen, or deleted when your smartphone is plugged into a public charging station? As it turns out — yes!
This post examines a hybrid email-and-phone scam in which attackers send emails from a genuine Microsoft email address.
Our experts at GReAT have uncovered a dangerous vulnerability in a smart-home control app that allowed attackers to disable physical security systems.
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
Businesses reaching the “acceptance stage”: given inevitable breaches — how to prepare for them?
Scammers are using Google ads to push fake versions of real websites – and they’re after business accounts and company data.
Newly discovered vulnerabilities in AirPlay allow attacks on Apple devices and other AirPlay-enabled products over Wi-Fi – including zero-click exploits.
We explore how cybercriminals are targeting IT specialists searching for a popular network scanner, using the Interlock ransomware attack as an example.
A look at how Apple’s new child protection features work, what their limitations are, and why you still can’t do without third-party solutions.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
It feels as if spam is as old as the internet itself. The post looks at the money-making scams devised over the years, and how to avoid them today.
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.