How to avoid turning your smartphone into a spyware zoo
Do you follow the news? The news may also be following you. ZooPark spyware targets those partial to politics.
320 articles
Do you follow the news? The news may also be following you. ZooPark spyware targets those partial to politics.
How Twitter’s “not-a-leak” made me realize that remembering passwords no longer works.
Fake airline giveaways won’t win you a ticket, but they might steal your data.
We explain what digital certificates are, what types exist, and what problems are associated with them.
Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.
Hidden miners detected in soccer and VPN apps on Google Play — steer clear!
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Even if you are really not an interesting target for an APT actor, you can still be used in a malware delivery chain
Internet of things is not getting any safer: Our experts analyzed a smart camera and found numerous vulnerabilities.
Yachts are now Internet-friendly — and vulnerable because developers aren’t focusing on information security.
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
We’re hosting an online workshop at the European Information Security Summit 2018 to help businesses get their networks prepared for new and emerging threats.
Cybercriminals attack Telegram users with an old trick for masking malware as pictures.
Belgian police and Kaspersky Lab obtain decryption keys for files hit by Cryakl.
Adult content is an ace in the hole for cybercriminals attacking Android devices.
While you’re watching YouTube, someone might just be using your device to mine cryptocurrency.
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.