Prilex blocks NFC transactions
The new version of Prilex malware, used to attack POS terminals, now can block NFC transactions.
2907 articles
The new version of Prilex malware, used to attack POS terminals, now can block NFC transactions.
We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.
Information security measures are far more effective when supported by top management. How to get this support?
Episode 283 includes ChatGPT cheaters, fake news and more concerns for the crypto world
Here are a few tips on how to make your Untappd profile as private and secure as possible.
In late 2022, Apple announced a raft of new data protection features. Why does that matter to users?
Researchers have found vulnerabilities in the desktop client of the Signal messenger. Let’s see how dangerous they really are.
A new generation of chatbots creates coherent, meaningful texts. This can help out both cybercriminals and cyberdefenders.
Received an attractive job offer from a stranger? Be careful! It could be a scam…
Episode 282 includes ChatGPT malware, smart device failures and naughty chat programs
A few words about why Telegram isn’t as secure as its developers boast.
Why it’s important to think about what data you share online, how to prevent being doxed, and what to do if you fail.
What to do if your secret messenger isn’t secret enough.
Miscommunication between a business and its information security service can lead to unnecessary losses. Today we try to work out how to overcome the communication barrier.
Episode 281 includes Twitter data breach, CryptoZoo fail, Silvergate woes and much more!
How to know if you’re facing a scam: we identify all the red flags in a recent scam that deployed a fake cryptocurrency exchange
Everybody knows that we should prepare ourselves for a “quantum future”, but it was expected to come about in 10-20 years’ time. Is a breakthrough possible this year?
And more importantly — how to stop your passwords from being used by cybercriminals.
The BlueNoroff APT group has adopted methods to bypass the Mark-of-the-Web mechanism
How to make sure a robot doesn’t spy on you, and can it function without internet access?