8 mistakes nearly every small business makes, and how to fix them
When it comes to information security, we’re seeing the same mistakes over and over again.
410 articles
When it comes to information security, we’re seeing the same mistakes over and over again.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
During a cyberattack in Hong Kong, LightSpy spyware infected the iPhones of people visiting counterfeit news sites.
Smartphones are always covered in bacteria, but viruses can also survive there, including COVID-19. We explain how to properly disinfect your smartphone.
MonitorMinor is one of the most dangerous spying apps for Android out there. Here’s why.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Victor Chebyshev talks about the most common mobile threats and attack vectors of 2019.
Inexpensive, no-fuss Burning Man tickets for sale online. Just one problem: They’re fake.
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
The ransomware app now uses infected devices to send SMS messages abroad on the victim’s dime.
Extorters are demanding ransom not in cryptocurrency, but in prepaid debit cards. All the same, you shouldn’t pay.
Our ICS CERT experts found 37 vulnerabilities in four VNC implementations. The developers have fixed most, but not all, of them.
Why stalkerware is a problem not only for targets, but also for security vendors – and what we’re doing to fix it.
Outsiders can penetrate your network through LAN sockets and devices in public areas.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Scammers prod employees to take performance appraisals but in reality siphon off their work account passwords.
Victims of Yatron and FortuneCrypt ransomware can download a decryptor from the No More Ransom website to recover their encrypted files.
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
There’s no malware in the official Android store, right? We get to the bottom of this claim.