Voice assistants hear things we don’t
We explain how ultrasound and audio recordings hidden in background noise can be used to control voice assistants.
629 articles
We explain how ultrasound and audio recordings hidden in background noise can be used to control voice assistants.
Crooks hacked telecom protocol SS7 to steal banking two-factor authentication codes.
The Razy Trojan secretly installs malicious extensions for Chrome and Firefox to serve phishing links and steal cryptocurrency.
WhatsApp and Facebook are swimming in links to ticket giveaways for fairs and airlines. Don’t get excited, though; the tickets are fake.
A huge database of leaked e-mails and passwords surfaced in the Internet. Here’s what you should do about it.
Analysis of a German sex toy reveals all sorts of vulnerabilities.
Security researchers found several ways to compromise hardware cryptocurrency wallets made by Ledger and Trezor.
Experts discovered lots of interesting things in the code of North Korean antivirus SiliVaccine.
The year 2018 passed under the sign of Spectre and Meltdown hardware vulnerabilities. What does 2019 have in store in this regard?
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
Why you shouldn’t open messages with e-cards from strangers, or believe that someone gave you an Amazon gift card for Christmas.
The 5 most common ways spammers can trick you into paying them or giving up your personal information.
Malefactors do not need to infect your computers with malware if they can just plug their devices right into your network.
50,000 printers worldwide suddenly printed a leaflet in support of youtuber PewDiePie. How can you protect your printer from hackers?
We take a look at the Rotexy mobile Trojan: where it comes from, how it behaves, and how to get rid of it using a couple of regular SMS.
Twitter cryptocurrency scams are becoming more and more advanced and convincing, with scammers using new techniques and some heavy artillery.
The personal data of 257,000 Facebook users, including private messages belonging to 81,000 of them, has leaked online. Hackers claim to have access to 120 million accounts.
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
One short message is enough to send a Sony PS4 into an infinite restart loop. Here’s how to deal with it.
Facebook has been breached, and malefactors gained access to some 50 million accounts. We offer some quick tips for your safety.
Android lets you configure app permissions to protect your data and restrict access to dangerous functions. We explain how to do it and why.