NRansom: Ransomware that demands your nudes
A new blocker called nRansom locks users out of their computers and demands not money, but nude pictures.
3200 articles
A new blocker called nRansom locks users out of their computers and demands not money, but nude pictures.
Transatlantic Cable Podcast episode 4: tax scams, trading data for swag, AI password cracking, and more.
A few more tips about gaming accounts safety, or How to protect your Steam, Uplay, Origin, battle.net and so on.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
Tools for giving a well-reasoned explanation of why security solutions are a must-have
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
Cybersecurity is ever-changing how can executives stay ahead of the curve?
In this week’s Transatlantic Cable podcast, we discuss the recent iPhone X FaceID feature, a casino hacked using a fish-tank, HMRC bugs as well as the Equifax breach and more.
How facial recognition works in the new Apple iPhone X — is it secure enough for you to trust?
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
Cryptocurrency mining is an IT industry buzzword and a rapidly growing phenomenon. As part of this far-reaching trend, more and more people take up “mining,” or adding blocks to a
Transatlantic Cable Podcast episode 2: autonomous pizza delivery, Sarahah’s privacy issues, reprieve for victims of Yahoo!’s data breach and more.
This week’s Transatlantic Cable podcast features stories on Burger King, scams, Instagram security and more.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
Modern technology actually helps phone scammers — what you need to know to stay safe.
Considering the modern threat landscape, the healthcare industry should pay more attention to cybersecurity
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Everyone talks about the advantages of Bitcoin and blockchain, but we never seem to hear about their disadvantages. Perhaps now is the time.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.