Researcher Fabian Ising, speaking at the Chaos Communication Congress, showed the limits of PDF encryption’s strength.
If you don’t want to pay for extra gigabytes in iCloud, try these other ways to backup your photos and other iPhone files.
More confirmation that storytellers are infosec experts.
Dave and Jeff discuss the EU’s response to Facebook’s pleas for regulation, ransomware shutting down a US energy company, Ring requiring 2FA, and more.
Victor Chebyshev talks about the most common mobile threats and attack vectors of 2019.
Inexpensive, no-fuss Burning Man tickets for sale online. Just one problem: They’re fake.
What exactly do those age restrictions mean? Can a 10-year-old play a 12+ rated title?
Dave and Jeff discuss Facebook’s European plea for regulation, Black Energy spreading on the dark web, Boston Children’s Hospital faces a cyberattack, and more.
What exactly was certified and how the certification was performed
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Let’s talk about mobile malware that can empty your bank account or spy on you.
The infamous Lazarus group’s newest campaign is really hard to detect. Bonus: How cryptocurrencies, cybercriminals, and ramen noodles are connected.
Take a stroll through your apps and you’re bound to encounter some unfamiliar names. Where do those unaccounted-for apps on your PC come from, and are they safe?
Researchers presented a study on the reliability of modern vehicle immobilization systems at the Chaos Communication Congress.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
End of support for Windows 7 is cause to analyze your information infrastructure carefully and identify weak spots.
Still using Windows 7? Time to go to Windows 10 — or beef up protection.
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
Don’t use the service? Delete your account. We explain which accounts are dangerous to leave dormant — and why.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Fear of the coronavirus is being leveraged by cybercriminals online to spread trojans and malware.
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity
If you own an Apple device, spend a few minutes setting up your System Location Services. You’ll protect your privacy and lengthen battery life.
Does saying “hyphen” five times to your iPhone really crash it — or is that just another myth?
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
How cybercriminals blocked Marcie’s iPhone, and how to avoid a similar fate.
50,000 printers worldwide suddenly printed a leaflet in support of youtuber PewDiePie. How can you protect your printer from hackers?
Setting up your child’s first smartphone right will help keep them safe — and save you money.
How to protect your Instagram account and personal photos from prying eyes.
Ten tips to make your private digital life really private.
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.