#BionicManDiary, entry 001: the story of how a chip was implanted into my body
I woke up to find a Band-Aid on my hand. It was covering a small wound between the thumb and the index finger. That was when I had a WTF moment.
1141 articles
I woke up to find a Band-Aid on my hand. It was covering a small wound between the thumb and the index finger. That was when I had a WTF moment.
On February 19th of 2015, it came out that Lenovo’s laptops had been shipped with an adware Superfish preinstalled. There are two major problems with this issue. The first one is
Frequently we (and many, many others) write about different skimming techniques and other ways of compromising bank cards. Today, we’ll talk about the less apparent dangers that run the risk of
Kaspersky’s GReAT team just published research on the Equation cyber-espionage group’s activity, and it revealed quite a few technical marvels. This old and powerful hacker group has produced a very complex series
A couple of weeks ago someone posted the following quote from Samsung’s Smart TV terms of service on Reddit: “Please be aware that if your spoken words include personal or
Once a user looks up a laptop or a slow cooker online, advertisements from online stores will begin to appear as if from the horn of abundance. This is exactly
In our recent blog post, “Jiggling with cards: doing criminal business on ATMs“, we told you how easily you could lose your money because of the tricks carders play on
In part one of our article, we discussed technology used by bank card ‘seekers’. Today we’ll relate another part of the story, covering how criminals carry out the most dangerous skimming
A new variant of the Onion ransomware has emerged, though you might see it referred to as CTB-locker or Citroni. Whatever you decide to call it, CTB-Locker is a Cryptolocker-like
Every year millions of people become victims of a data breach. For the majority, the results are the same: hackers sell users’ data on underground websites and companies have to rush
We all know to be aware of pickpockets. Even if it did not include tips on watching your pockets when outdoors, life itself provides opportunities to learn the simple rules.
“British Prime Minister David Cameron to ban encrypted messengers” — headlines like this one are all over the news at the moment, and with good reason. Opinions vary from “Let’s protect
The first ever publicly known Mac OS X firmware bootkit emerged out of the 31st Chaos Computer Club conference in Hamburg, Germany last month. Security researcher Trammel Hudson developed the
CES 2015 was a superb event in terms of new stuff per square foot, which has been referred to numerous times by tech website reporters. As for me, a person
Last year was an eventful one for the IT-security field. There were a lot of incidents, starting with global vulnerabilities to showdowns with local cybercriminals. So, as way of looking back we
Gaming is a multi-billion pound industry with millions of players across the globe. With this volume of users and money sloshing around, it’s inevitable that hackers and criminals come calling.
To some extent your connected PC or mobile device is a lonely warrior lost in unknown territory and this situation repeats each time you are online. In many cases your
Have you already bought all of your Christmas and New Year gifts, booked holiday tickets and hotel rooms? There’s a good chance that a good portion of those reading this
Researchers at Kaspersky Lab have uncovered a new variant of the infamous Zeus Trojan. It’s called Chthonic, a reference to spirits or deities from the underworld in Greek myth, and
It was an enjoyable Saturday night, when a friend of mine suddenly received an SMS notification telling him that his card had been charged 550 EUR… in Greece. “What the…?”, was
Welcome to the second post in a series of blog posts regarding the false perception of IT- security. In this post we will describe some of the issues associated with