Momo, the horror from WhatsApp
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
0 articles
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.
More than 400 manufacturing companies became phishing targets.
Fileless malware infects workstations and servers in corporate networks.
In the Netherlands, the creators of one of the first ransomware cryptors are on trial, thanks largely to us.
Password-based love? Sites that ban humans? In this post, we look at five fun and slightly bizarre projects to get you thinking about security.
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
In part one of our mobile malware series, we cover infectious Android malware — adware, subscribers, and flooders — and how mobile viruses can damage your smartphone or tablet
How tools designed to study and protect rare species can turn from gamekeeper to poacher.
Do you know what children look for online? The answers may surprise you.
What is the cost of an incident that affects corporate data? Which threats are the most expensive? Learn that and more from our latest research.
A look at how payment information is protected on smartphones that support contactless payments.
Do you follow the news? The news may also be following you. ZooPark spyware targets those partial to politics.
Rumor has it that typing “BFF” as a Facebook comment checks your profile security. We investigate the claim.
Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.
Hidden miners detected in soccer and VPN apps on Google Play — steer clear!
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.