AirTag stalking and how to protect yourself
In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.
44 articles
In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.
Methods of reasonable protection against potential freelancer related cyberthreats.
Does hardware vulnerabilities in CPU pose a practical threat to businesses?
What’s in Google’s report on typical attacks against cloud systems in Google Cloud Platform?
A cyberattack has affected an unexpectedly large number of industrial systems.
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
Employees can install proxyware without their employer’s knowledge, introducing additional business cyberrisks.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
A recent study shows that even “clean” Android smartphones collect a lot of information about their owners.
Just like many other modern devices, seemingly “dumb” feature phones are much smarter than you might think. And this may be a problem.
At DEF CON 29, a researcher explained why agricultural machinery should be considered critical infrastructure and demonstrated vulnerabilities in the main manufacturers’ equipment.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.