Ransom: To pay nothing or not to pay? That is the question
Three reasons not to pay cyber-extortionists — and what to do if you get hit.
656 articles
Three reasons not to pay cyber-extortionists — and what to do if you get hit.
Would Johnny Mnemonic’s cybersecurity be plausible in the real 2021?
CD Projekt confirms attack on internal systems. Hackers claim to have downloaded Cyberpunk 2077 and The Witcher 3 source code, and demand ransom.
Hackers are actively exploiting a dangerous vulnerability in Google Chrome. With Chrome 88.0.4324.150, Google has patched the vulnerability.
When the creators of Fonix ransomware abandoned their malicious ways and published the master key, we made a decryptor out of it.
Cybercriminals are sending phishing e-mails to hijack access to ESP accounts.
Why the computers in human resources are especially vulnerable, and how to protect them.
Version 14.4 patches vulnerabilities that cybercriminals are actively exploiting. Install this update as soon as possible.
Seemingly overnight, the pandemic changed the way we work, and infosec departments are still adjusting. What’s on the horizon for employees in the coming year?
Hell hath no fury. A former medical device supplier sabotages deliveries to customers.
No one should be using the dead technology, and any websites that still use it need an update.
“Zyfwp,” an admin-level account with a hard-coded password, discovered in several networking devices made by ZyXel.
Can you transmit wireless data over a wired network? Evidence shows it can be done.
Computers don’t necessarily need a Wi-Fi module to transmit information over Wi-Fi, Israeli researchers have found.
We examine the first installment in the Die Hard series from a cybersecurity standpoint.
Why backing up is good but not enough when it comes to staying safe from ransomware.
Our method for training models to filter out spam lets you maintain privacy without losing efficiency.