How I hacked my Apple ID security questions
Why questions like “What is your mother’s maiden name?” and “What did you do last summer?” don’t protect you.
535 articles
Why questions like “What is your mother’s maiden name?” and “What did you do last summer?” don’t protect you.
What if you have to transmit sensitive data and the only connection is open Wi-Fi? We’ve got you covered.
Facebook is going to use your WhatsApp data to tune its advertising, but for now you can opt out of this deal.
One Instagram post with a picture of a ticket can cost you a whole lot of time and money and ruin your day. This is how you can avoid it
The changeover from magnetic stripe cards to chip cards cost millions of dollars but promised greater security. At Black Hat 2016, researchers told us that the new cards are nonetheless insecure.
Researchers discovered a hack that affects 100 million Volkswagen cars. And the equipment needed costs just $40.
Charlie Miller and Chris Valasek learned to hack a car’s steering wheel, brakes, and acceleration. They presented their finding at Black Hat USA 2016.
By now, you are no doubt familiar with short-term rental sites — AirBnB, Homeaway, and the like. Many of you reading this have used them, whether as guest or as
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.
I remember when Pokémon came out on the Nintendo Gameboy. It was a challenging game that had my friends and me trying to catch all of the monsters. It was
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
Criminals are stealing money from freelancers — by offering them a job.
Apple no longer encrypts the kernel of its iOS operating system. It seems that this is another step towards turning iOS into something similar to Android.
Have you ever received a letter from a Nigerian prince? A Nigerian astronaut? How about Daenerys Targaryen? If so, you know that we are talking about funny Nigerian spam — and this post covers it all!
While we rest, cybercriminals work. Kaspersky Lab discusses the main risks for tourists and travelers on business trips.
Kaspersky Internet Security and Kaspersky Total Security can help protect your privacy in a variety of ways including not allowing your webcam to serve as a spying device.
Let’s talk about new security technologies in Windows 10: Are they enough to make the new operating sys-tem totally secure?
This tiny device will help you protect your smartphone from malware and data leakage when charging in public places.