Update iOS, there is a dangerous vulnerability in WebKit
Dangerous vulnerability in WebKit (CVE-2022-22620) is believed to be actively exploited by hackers. Update your iOS devices as soon as possible!
665 articles
Dangerous vulnerability in WebKit (CVE-2022-22620) is believed to be actively exploited by hackers. Update your iOS devices as soon as possible!
How to protect your iPhone or Android smartphone from Pegasus and similar mobile APTs.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
Microsoft patches more than a 100 vulnerabilities in Windows 10 and 11, Windows Server 2019 and 2022, Exchange Server, Office, and Edge browser.
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
Employees can install proxyware without their employer’s knowledge, introducing additional business cyberrisks.
We analyze some typical examples of phishing bait for movie streamers.
We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Over the past five years, the Trickbot banking Trojan has evolved into a multifunctional tool for cybercriminals.
Just like many other modern devices, seemingly “dumb” feature phones are much smarter than you might think. And this may be a problem.
FinSpy spyware targets Android, iOS, macOS, Windows, and Linux users. Here’s what it can do and how to stay protected.
Google released an update that patches three dangerous vulnerabilities in Google Chrome. Update your browser right away!
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
To protect MikroTik routers from the Mēris botnet, or to clean a previously infected router, users should update RouterOS and check settings.
Scammers are sending fake transfer receipt notifications to Luno cryptoexchange users and stealing their credentials.
Guard against ransomers who encrypt your files and demand payment for their safe return.
One version of popular WhatsApp mod FMWhatsApp uses an infected advertising module that downloads Trojans to smartphones.