Randstorm: vulnerable crypto wallets from the 2010s
Bitcoin wallets created on online platforms between 2011 and 2015 may be insecure due to a vulnerability in the library for key generation.
1129 articles
Bitcoin wallets created on online platforms between 2011 and 2015 may be insecure due to a vulnerability in the library for key generation.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
A look at some recent cases of Android malware infiltrating the most official of official app stores — Google Play.
Buying a cheap Android device can be an expensive mistake if it fails to perform its primary function or happens to be infected with viruses right out of the box.
The three most dangerous Android features that make your smartphone much more vulnerable to malware.
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
Examples of how QR codes in emails are used for phishing.
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
Fraudsters are buying blue checkmarks to impersonate well-known brands on X (ex-Twitter) and scam users.
We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
Kids use social networks and IMs a lot, and don’t keep in mind that the “internet remembers all”. How to reduce the digital footprint of your tiny beloved ones (even if they’re taller than you).
Web services and apps are part and parcel of the modern learning process — both online and offline. But they’re often insecure and pose a threat to your child’s personal data. How to stay safe?
Researchers have found several spyware-infected versions of Telegram and Signal on Google Play.
The new school year is in session. Here are some tips for keeping your kids safe both on their devices and online.
A new school year, and a familiar headache for parents: kids’ cybersecurity. In this first post, we discuss how to protect your children’s gadgets from cyberthreats.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.