Hijacking online accounts through voicemail
When it comes to online accounts, voicemail is a major security hole. Here’s why.
69 articles
When it comes to online accounts, voicemail is a major security hole. Here’s why.
Originally targeting users from Japan, Korea, and China, Roaming Mantis is quickly spreading worldwide, infecting smartphones through hacked wi-fi routers.
Do border agents have the right to search your devices? How can you protect your data from searches at the border? We have 11 tips covering this topic.
If someone offers cryptocurrency for nothing, remember the only free cheese is in a mousetrap. Here’s what’s really going on.
Xiaomi’s robotic vacuum cleaner was hacked by security researchers. However, it proved much more secure than most other smart devices.
The largest motor show in the world is the best place to see what cars will look like in the near future.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?
It turns out there are bots in Tinder and OkCupid. Who wants that?
Samsung releases more and more devices with Tizen OS. At SAS 2017, we found out that this OS is highly insecure.
There’s been a lot of talk lately about privacy protection and VPNs. But what exactly is a VPN? We explain in simple words.
An unconventional Android Trojan does not do anything to your smartphone; instead it hacks the Wi-Fi hotspot the smartphone is connected to.
Ransomware research shows that paying ransom is no guarantee you’ll get your files back.
Security researchers claim that they have managed to remotely hack an unmodified Tesla Model S with the latest firmware installed.
Up close and personal, one Kaspersky Labs editor’s experience with the system failure at Delta Air Lines.
Charlie Miller and Chris Valasek learned to hack a car’s steering wheel, brakes, and acceleration. They presented their finding at Black Hat USA 2016.
Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.