Don’t believe your ears: voice deepfakes
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
315 articles
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
What web skimmers are, why you should keep a look out for them when shopping online, and how to protect yourself.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.
Now anyone can sign device firmware with MSI private keys. This represents a long-term persistent risk to be considered by all users.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
The effectiveness of a sandbox largely depends on its ability to realistically imitate a working environment.
Сloud technologies differ in terms of both costs and risks. What cloud type should you choose, and how should you begin your migration?
It’s obvious already that AI needs regulating, but how? Here’s Eugene Kaspersky telling us how he sees it.
Full review of a fake cryptowallet incident. It looks and feels like a Trezor wallet, but puts all your crypto-investments into the hands of criminals.
Image-generating neural networks are already everywhere. What privacy risks do they pose?
Linux and ESXi-based systems are increasingly falling victim to ransomware attacks. So how can you protect your servers?
Hardware crypto wallets are effective at protecting your cryptocurrency, but they can still be stolen from. Let’s address the risks their owners need to be protected from.
How to reliably protect your cryptocurrency given the numerous fraud schemes and lack of protection through government regulation.
Scammers are using social engineering to shake down newly onboarded employees.
We investigate why chip cards are no panacea, and what precautions should be taken when making a payment.