Hacking a train: a 37С3 talk
Ethical hackers told 37C3 how they found a few eye-openers while breaking DRM to fix trains.
363 articles
Ethical hackers told 37C3 how they found a few eye-openers while breaking DRM to fix trains.
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
Android 13 and 14 have a feature called Restricted Settings. We explain its purpose, and how malicious applications bypass it.
Typical security issues of WordPress, and how they can be addressed to protect your website or online store from cybercriminals.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
A look at some recent cases of Android malware infiltrating the most official of official app stores — Google Play.
Buying a cheap Android device can be an expensive mistake if it fails to perform its primary function or happens to be infected with viruses right out of the box.
The three most dangerous Android features that make your smartphone much more vulnerable to malware.
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
Examples of how QR codes in emails are used for phishing.
We take an in-depth look at securing and configuring containerization systems.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
We take a look at drivers: why we need them, the threats they pose, and how to keep your computer secure.
Researchers have found several spyware-infected versions of Telegram and Signal on Google Play.