Google Play’s app descriptions have a new Data Safety section now. We explain why this isn’t such great news.
The Andariel group attacks companies with several malicious tools.
Microsoft has released patches for more than 140 vulnerabilities, some of which need to be closed as soon as possible.
A look at what experts at Kaspersky will be watching during Black Hat 2022.
We recall the story of the ILOVEYOU worm — one of the most infamous viruses from 22 years ago.
The story of the first serious attack on corporate IT infrastructure.
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
New malicious campaign hunts for Discord tokens and credit card information via infected npm packages.
How things stood with information security in a galaxy far, far away — nine years before the Battle of Yavin.
Our experts discovered a fresh version of CosmicStrand, a rootkit that hides from researchers in the UEFI firmware.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
How cybercriminals attack companies without using malware.
Work e-mails stamped “verified” should set alarm bells ringing.
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
The most effective protection is increasing employees’ awareness, and it’s up to HR to maintain it.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
How to check for hidden cameras in a hotel room or rented apartment.
We cite an interesting study on how the mute button actually works in teleconferencing services, and discuss privacy in the web conferencing era.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
If your phone falls into the hands of criminals, do not panic. Here is how to protect your data.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
Most third-party apps for connected cars require access to your account with the manufacturer. But are they secure?
We review a major cryptocurrency theft using spyware inside a PDF.
How scammers swindle users out of cryptocurrency through a fake Nvidia giveaway supposedly worth 50,000 BTC.
How scammers lure YouTube users to a fake website where a purported bug lets them exchange Bitcoin at an excellent rate.
How cybercriminals extract bank card details pretending to be DHL.