Zoom 5 moves toward security
Zoom developers have made their service more secure. We review what’s changed.
3313 articles
Zoom developers have made their service more secure. We review what’s changed.
Our experts uncovered a scheme to extract cardholder data using Google tools.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
To protect ADAS from external interference, cars need a special approach to cybersecurity.
This week, Dave and Jeff discuss a crazy story of cyberstalking from eBay, NHS tracing app issues, cryptoexchange money laundering, and more.
A particular type of malware seeks user credentials, including accounts for gaming services such as Origin, Battle.net, and Uplay.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
We explain how to keep your computer running fast without sacrificing protection.
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
Dave and Jeff discuss a ransomware attack on Honda, the support life of IoT appliances, Singapore COVID-19 tracking, Space Force, and more.
The abundance of work-related cloud tools and services calls for smart password handling.
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
Alongside their benefits, cloud solutions for file storage and document or project management can cause many problems.
Dave and Jeff discuss how to keep personal data safe while protesting, the kerfuffle around NHS coronavirus texts, and more.
How to find an individual approach for each employee without committing to a personal mentor for everyone.
It’s hard not to worry when you don’t know where your child is. We explain how to pinpoint their location and save your nerves.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
Dave and Jeff sit down with Marco Preuss to discuss the ethics of social ratings, masked selfies, and more.