Juggling with cards: doing criminal business on ATMs
We all know to be aware of pickpockets. Even if it did not include tips on watching your pockets when outdoors, life itself provides opportunities to learn the simple rules.
1131 articles
We all know to be aware of pickpockets. Even if it did not include tips on watching your pockets when outdoors, life itself provides opportunities to learn the simple rules.
“British Prime Minister David Cameron to ban encrypted messengers” — headlines like this one are all over the news at the moment, and with good reason. Opinions vary from “Let’s protect
The first ever publicly known Mac OS X firmware bootkit emerged out of the 31st Chaos Computer Club conference in Hamburg, Germany last month. Security researcher Trammel Hudson developed the
CES 2015 was a superb event in terms of new stuff per square foot, which has been referred to numerous times by tech website reporters. As for me, a person
Last year was an eventful one for the IT-security field. There were a lot of incidents, starting with global vulnerabilities to showdowns with local cybercriminals. So, as way of looking back we
Gaming is a multi-billion pound industry with millions of players across the globe. With this volume of users and money sloshing around, it’s inevitable that hackers and criminals come calling.
To some extent your connected PC or mobile device is a lonely warrior lost in unknown territory and this situation repeats each time you are online. In many cases your
Have you already bought all of your Christmas and New Year gifts, booked holiday tickets and hotel rooms? There’s a good chance that a good portion of those reading this
Researchers at Kaspersky Lab have uncovered a new variant of the infamous Zeus Trojan. It’s called Chthonic, a reference to spirits or deities from the underworld in Greek myth, and
It was an enjoyable Saturday night, when a friend of mine suddenly received an SMS notification telling him that his card had been charged 550 EUR… in Greece. “What the…?”, was
Welcome to the second post in a series of blog posts regarding the false perception of IT- security. In this post we will describe some of the issues associated with
Technology evolves in a way that no one can predict or foresee. Accepting that fact, let us recall the geeky sci-fi fantasies from as far back as the 1960s, such
Time and time again did we write about the dangers public Wi-Fi hotspots pose to users, but today we are talking about threats coming specifically from home wireless networks. Many
The automotive industry is notoriously conservative. It is quite understandable, given the inherently ‘hazardous’ nature of cars: vehicles need to be clear of clutter in order to give the driver
This is the first blog post in a series of posts where I will try to document some of the false perceptions about IT security — and believe me, there
Technology is progressing at a frightening pace and is now part and parcel of our everyday lives. However, despite all the breakthroughs, everything is not as it seems. People are no longer
This is how a seemingly simple SIM card in your smartphone can contribute to the loss of money and personal data.
One morning when I was in a hurry to get to work, everything went wrong in an instant: an SMS message alerted me to an $80 charge to my credit card for a purchase that I never made.
Kaspersky Lab revealed a cyberspy campaign, Darkhotel, which had been active for seven years in a number of luxury Asian hotels.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
It’s not always easy to give general advice to Android users because the OS is so very diverse. But we have ten security tips that are relevant for almost any Android version.