120 articles
Everyone knows that EXE files can be dangerous for computers running Windows. But it turns out that EXE files can infect macOS too.
Commercial spying apps — stalkerware — are not malware in the proper sense of the term, but it’s better to avoid using them anyway.
Apps that demand access to calls and SMS messaging without good reason are being kicked off Google Play. We explain what threats might arise.
Systems designed to guard against car theft can be used to track, immobilize, and steal vehicles.
The hidden dangers of out-of-office messages.
Adult websites are often seen as a security threat, but few know that Trojans could be after their porn site accounts.
Can an ATM turn into a slot machine? WinPot malware helps its owners win big at the “ATM game.”
Things you should know about your home Internet connection: How to be sure it is safe and waste no time calling tech support.
Cybercriminals are bypassing mail spam filters by hiding documents with a malicious link in SharePoint Online.
Ex-employees can go to extremes for the sake of revenge. How to terminate a work relationship safely and securely.
Employees going away for the winter break? We explain what to do to keep trips from turning into corporate data leaks.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
We take a look at the Rotexy mobile Trojan: where it comes from, how it behaves, and how to get rid of it using a couple of regular SMS.
Banking Trojans are increasingly focused on online stores. We explain how not to become a victim of malware during the annual holiday sales.
Let’s talk about mobile malware that can empty your bank account or spy on you.
Forgotten online resources can be used for extortion or phishing
The infamous Lazarus group’s newest campaign is really hard to detect. Bonus: How cryptocurrencies, cybercriminals, and ramen noodles are connected.
KeyPass ransomware is infecting computers worldwide, encrypting almost everything in its path. And it all starts with downloading a seemingly innocuous installer.
Take a stroll through your apps and you’re bound to encounter some unfamiliar names. Where do those unaccounted-for apps on your PC come from, and are they safe?