Business data safety: You can’t have too many backups
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
164 articles
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
A bug in WinRAR allows malefactors to gain full control over your device. All they need you to do is unpack a rigged RAR file.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
Can an ATM turn into a slot machine? WinPot malware helps its owners win big at the “ATM game.”
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Epidemics, espionage, destruction: We present the most memorable cyberattacks of recent years.
Freelancers are beloved targets for cybercriminals, who use phishing and malware to steal credentials and money. Here’s how to avoid their traps and stay safe.
Let’s talk about mobile malware that can empty your bank account or spy on you.
Almost half of the most-visited websites open visitors to potential dangers. What can you do?
In this edition of the podcast, Jeff and Dave discuss the Black Hat USA conference, a downside of Fortnite coming to Android, the Reddit hack, and our latest report on the state of malware.
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.
The recently leaked source code actually isn’t Carbanak — it’s another advanced financial malware family. And the leak will likely have a huge ripple effect.
In part one of our mobile malware series, we cover infectious Android malware — adware, subscribers, and flooders — and how mobile viruses can damage your smartphone or tablet
Did you see that new fully loaded Android smartphone, the one that looks too good for the price? Well, it may include some unwanted extras.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
Next year is likely to see malware creators and distributors switch from ransomware to malicious Web miners.
One of the most popular porn sites in the world was serving malware through ads to millions of its users.
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.