
Are connected car apps secure?
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
1141 articles
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
In this week’s Transatlantic Cable podcast, we discuss the recent iPhone X FaceID feature, a casino hacked using a fish-tank, HMRC bugs as well as the Equifax breach and more.
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
Cryptocurrency mining is an IT industry buzzword and a rapidly growing phenomenon. As part of this far-reaching trend, more and more people take up “mining,” or adding blocks to a
Transatlantic Cable Podcast episode 2: autonomous pizza delivery, Sarahah’s privacy issues, reprieve for victims of Yahoo!’s data breach and more.
This week’s Transatlantic Cable podcast features stories on Burger King, scams, Instagram security and more.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
Modern technology actually helps phone scammers — what you need to know to stay safe.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Facebook’s Alex Stamos explains why the information security industry has the wrong priorities and what should be done about it.
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?
At the Black Hat conference, researchers demonstrated that typing on the keyboard while talking on Skype is not safe.
In an earlier post from Black Hat, I discussed how car washes could be hacked. Today, we can remove the “wash” part and simply focus on the car. More specifically,
Global IT security problems like the recent Petya attack are of clear concern to large corpora-tions — but they affect common people as well.
A new ransomware outbreak is happening right now. Here’s what we know so far and what you can do to protect yourself from the threat.
Facebook has been crawling with reposts that claim to be giving away thousands of free airline tickets. We uncover the truth.
Many users of devices running Android are tempted to root them. Here we explain the good and bad sides of having superuser rights.