
SLAP and FLOP: Complex vulnerabilities in Apple CPUs
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
It feels as if spam is as old as the internet itself. The post looks at the money-making scams devised over the years, and how to avoid them today.
Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
Banshee stealer, a macOS stealer that emerged last year, is now roaming free on the Web, infecting Mac users and gaining new capabilities. How to protect yourself?
Scareware is malware that scares users into doing something risky. Here’s how it works.
What network-security and access-control tools do the world’s top cyber-regulators recommend to companies?
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.
Black Friday is a great opportunity for scammers to line their pockets — but not with your money if you follow our advice.
Five dead simple tips to greatly improve your defenses against cybercriminals.