Prices down, miners up
In 2022, cryptocurrency prices fell sharply, but malicious miners are more active than ever.
0 articles
In 2022, cryptocurrency prices fell sharply, but malicious miners are more active than ever.
We explain how the NullMixer dropper can download numerous Trojans onto a device.
Our experts discovered a fresh version of CosmicStrand, a rootkit that hides from researchers in the UEFI firmware.
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
Most third-party apps for connected cars require access to your account with the manufacturer. But are they secure?
The Lazarus group continues to prey on cryptocurrency: cybercriminals distribute DeFi wallets with built-in backdoor.
In 2021 there were fewer attacks on smartphones and tablets than in 2020. But that’s no reason to relax, and here’s why.
FinSpy spyware targets Android, iOS, macOS, Windows, and Linux users. Here’s what it can do and how to stay protected.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Spammers are using malicious macros to distribute IcedID and Qbot banking malware in seemingly important documents.
Stalkerware activity dropped off during the pandemic, but it’s picking up again. How to deal with the threat.
Keys make a clicking sound when inserted in door locks. Scientists have found a way to duplicate a key using a recording of the sound.
Privacy International talks about period-tracking apps and the perils of sharing secrets with apps.