Hacking a powered-off iPhone: vulnerabilities never sleep
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
767 articles
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
Here’s how phishers extract phone numbers and credentials from users of Wise.
New vulnerability CVE-2022-30190, aka Follina, allows exploitation of Windows Support Diagnostic Tool via MS Office files.
We explain how scammers steal cryptowallets through phishing.
We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.
Time to update Windows! Microsoft has released patches for several dozen vulnerabilities, one of which cybercriminals are actively exploiting.
We explain how Android users fall victim to Trojan subscribers Jocker, MobOk, Vesub and GriftHorse.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
The Lazarus group continues to prey on cryptocurrency: cybercriminals distribute DeFi wallets with built-in backdoor.
Malicious spam campaign targeting organizations grows 10-fold in a month, spreads Qbot and Emotet malware.
Microsoft patches 128 vulnerabilities in a list of products, including Windows and its components.
Researchers found critical vulnerability in Spring, a popular Java framework. Here’s how it works, why it’s dangerous and how to protect from it.
The recent Google Chrome update patches 10 high severity vulnerabilities and a dozen of less critical bugs. Time to update your browser!
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
In 2021 there were fewer attacks on smartphones and tablets than in 2020. But that’s no reason to relax, and here’s why.
Hackers from Lapsus$ group claim they breached Okta, a major provider of access management systems.
What is a seed phrase, how scammers use it to steal cryptowallets, and how to protect your MetaMask account.
The geopolitical conflict in Ukraine is the latest example of malicious actors trying to cash in on unsuspecting victims.
HermeticRansom cryptor was used as a distraction to support HermeticWiper attacks.
In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.
Dangerous vulnerability in WebKit (CVE-2022-22620) is believed to be actively exploited by hackers. Update your iOS devices as soon as possible!