How to watch the World Cup and not get scammed.
Every year, the number of tasks we entrust to machines rises steadily. How safe is this?
In the final part of the series, we take a look at cryptocurrency politics, the future, and the metaverse.
Why might a business email contain a link to Google Translate?
Is it possible to make a hack-proof system?
Here are some simple tips to protect your funds from fraudsters, phishers and carders when shopping online.
Miners still pose a threat to businesses — especially ones that use cloud infrastructure.
In 2022, cryptocurrency prices fell sharply, but malicious miners are more active than ever.
Scammers are sending e-mails under the guise of government agencies to coax personal data and money out of users.
Research on an unusual way to steal passwords: using a thermovisor.
Our research reveals gamers’ attitudes toward computer performance — and the ethics of winning and losing.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
An interesting bug in one of the most popular embedded DBMS.
What signs may indicate that a device is infected or being attacked by a hacker.
Which corporate assets should be first in line for protection against cyberattacks?
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
Servers with the Zimbra Collaboration suit installed are being attacked via an archive unpacking tool.
The top-4 technologies in use today that long belong in a museum.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
How to check for hidden cameras in a hotel room or rented apartment.
We recall the story of the ILOVEYOU worm — one of the most infamous viruses from 22 years ago.
How things are privacy-wise on the social network Poparazzi.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
We cite an interesting study on how the mute button actually works in teleconferencing services, and discuss privacy in the web conferencing era.
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
We review a major cryptocurrency theft using spyware inside a PDF.
How scammers swindle users out of cryptocurrency through a fake Nvidia giveaway supposedly worth 50,000 BTC.
How scammers lure YouTube users to a fake website where a purported bug lets them exchange Bitcoin at an excellent rate.
How cybercriminals extract bank card details pretending to be DHL.