Scammers are distributing malware and adware made to look like Windows 11.
The Geneva Dialogue discusses the program, where it stands, and what the future holds.
Dave and Jeff discuss the latest with REvil and its victims, LuminousMoth, and buying a Cold War bunker.
Tips on security and productivity for those who work both from home and in an office.
How secure are online dating apps privacy-wise?
Scammers pretend to represent brands on Twitter and lure customers onto phishing websites. Here’s how to avoid it.
Dave, Ahmed and Jeff discuss Interpol’s urge for unity over ransomware, a new SolarWinds bug, Right to Repair and much more.
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
Digital-only badges, COVID tests every 72 hours, mandatory FFP2 masks, and other signs of the new normal at MWC21.
Spammers are using malicious macros to distribute IcedID and Qbot banking malware in seemingly important documents.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Gut-wrenching stories of in-game cheating told by actual participants.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.
Cybercriminals are disguising ransomware as a beta version of Cyberpunk 2077 for Android.
The world’s first show for gaming moms is on YouTube. Its purpose: breaking stereotypes about video games (and about parents).
Ahead of its release, scammers are offering free Cyberpunk 2077 downloads, but they’re really after your data.
The online battle royale shooter attracts not only virtuoso gamers, but also crooks of every stripe. How can you avoid becoming a victim?
Update all Windows systems immediately to patch CVE-2021-1675 and CVE-2021-34527 vulnerabilities in the Windows Print Spooler service.
Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials.
Does isolating a network segment really guarantee its invulnerability?
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
Some network-attached storage from WD has been reset to factory settings, wiping users’ data. Here’s how to protect your WD NAS.
How to protect your clients from cybercriminals impersonating your company on Twitter.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
To stop all threats to the corporate infrastructure, you have to do more than just protect workstations.
Our technologies detected targeted attacks involving a number of zero-day exploits.
Many swear phones secretly listen in through their built-in microphones. We investigate the claims — and offer other explanations for spookily precise mobile ads.
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
A ransomware attack forced Ireland’s healthcare service to shut down its servers. Here’s what we know so far.
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
If notifications are interrupting your work or play, turn them off.
Ten tips to make your private digital life really private.
How scammers use voice calls for phishing.
Tired of never-ending notifications? Here is how to turn them off on Apple computers.
If your phone falls into the hands of criminals, do not panic. Here is how to protect your data.
No one is immune to smartphone theft, but you can make sure no thief will get even a byte of your important data.