Android 13 and 14 have a feature called Restricted Settings. We explain its purpose, and how malicious applications bypass it.
Unused apps not only clutter your phone but also create a risk of personal data leakage, so it’s better to remove them. But what if an app can’t be uninstalled? There’s a workaround.
Typical security issues of WordPress, and how they can be addressed to protect your website or online store from cybercriminals.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
How a recently discovered bug in Intel processors threatens cloud providers.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.
A look at the pros and cons of updating Android — and ways to do it safely.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
Why scammers are more likely to target kids than hardcore gamers, how they do it, and what they want to steal
Our research reveals gamers’ attitudes toward computer performance — and the ethics of winning and losing.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
Four handy ways to lock your screen on Windows and macOS.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
Four major studies presented by our experts at the SAS 2023 international conference.
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
If you receive a message saying your Facebook account has been blocked for copyright violation, don’t panic. It’s most likely just another phishing scam.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.
A few words about why Telegram isn’t as secure as its developers boast.
Scammers are pretending to offer users tens of thousands of dollars, supposedly accumulated in an account on an “automated cloud-mining platform”.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Minecraft mods downloaded from several popular gaming websites contain dangerous malware. What we know so far.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
Some thoughts on what PC software patches should be prioritized and why.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.