A good reason to avoid cheap Android smartphones
Did you see that new fully loaded Android smartphone, the one that looks too good for the price? Well, it may include some unwanted extras.
629 articles
Did you see that new fully loaded Android smartphone, the one that looks too good for the price? Well, it may include some unwanted extras.
We investigate intercepting smartwatch motion-sensor data to monitor people and steal information.
How to avoid getting phished or otherwise duped on the eve of the 2018 World Cup in Russia.
How scammers are exploiting the GDPR fuss to extract personal data.
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
Originally targeting users from Japan, Korea, and China, Roaming Mantis is quickly spreading worldwide, infecting smartphones through hacked wi-fi routers.
Do you follow the news? The news may also be following you. ZooPark spyware targets those partial to politics.
This new version of SynAck ransomware uses sophisticated evasion techniques.
Fake airline giveaways won’t win you a ticket, but they might steal your data.
Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.
Malefactors are massively exploiting a vulnerability in Cisco switches, taking down entire segments of the Web.
Hidden miners detected in soccer and VPN apps on Google Play — steer clear!
Most computer infections come from visiting porn sites, or so some people say. Are they right?
The day I turned home network defender and stopped making fun of IoT developers.
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
At this year’s Security Analyst Summit, Inbar Raz revealed how he managed to crack a cafe chain’s loyalty card system, a taxi service, and an airport
Internet of things is not getting any safer: Our experts analyzed a smart camera and found numerous vulnerabilities.
Yachts are now Internet-friendly — and vulnerable because developers aren’t focusing on information security.