Hacked hotel accounts on Booking.com
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
425 articles
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
Android 13 and 14 have a feature called Restricted Settings. We explain its purpose, and how malicious applications bypass it.
Typical security issues of WordPress, and how they can be addressed to protect your website or online store from cybercriminals.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
Ready, set, tech: preparing for your kids’ first device.
A detailed checklist on how to prepare for and navigate your child’s first gadget experience.
The three most dangerous Android features that make your smartphone much more vulnerable to malware.
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
Examples of how QR codes in emails are used for phishing.
Examples of password policies that will have users tearing their hair out — and why you shouldn’t employ them.
Fraudsters are buying blue checkmarks to impersonate well-known brands on X (ex-Twitter) and scam users.
We propose six principles of ethical use of AI in the cybersecurity industry — to be presented at the global Internet Governance Forum.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
Kids use social networks and IMs a lot, and don’t keep in mind that the “internet remembers all”. How to reduce the digital footprint of your tiny beloved ones (even if they’re taller than you).
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.