
Charging your smartphone’s battery over USB can be dangerous
Charging your smartphone’s battery over USB can be dangerous: Thieves can steal your files, infect your smartphone with something nasty — or even brick it.
4140 articles
Charging your smartphone’s battery over USB can be dangerous: Thieves can steal your files, infect your smartphone with something nasty — or even brick it.
One of the most popular techniques used to penetrate corporate defenses is the use of vulnerabilities found in working software, which, in fact, do not need to be brand-new 0-days.
So you just paid for tickets to the Olympics, and now you’re planning your trip to Rio de Janeiro? Check that ticket twice: you may have been scammed.
A look at recent survey results on awareness of ransomware in North America.
At the recent I/O 2016 conference Google announced Android N, Wear 2.0, new messenger Allo, voice assistant Google Home, and a laundry list of other tech miracles. What about security?
Kaspersky Lab RakhniDecryptor utility updated to help decrypt files encrypted by previously invincible versions of TeslaCrypt.
In a highly surprising move, the notorious Teslacrypt authors have wrapped up their operation and released the ransomware’s master key.
Researchers expose details of 70,000 OKCupid accounts, without permission.
All files encrypted with TeslaCrypt ransomware can now be decrypted … thanks to its creators
Old LinkedIn data is being sold on the darkweb. Time to change your password!
The Petya ransomware installer now includes another ransomware called Mischa that complements it.
Criminals behind the ATM Infector campaign are turning ATMs into invisible skimmers.
Suddenly in an instant I became an outsider in the system. While I was being ‘fixed’, I had an opportunity to think about it and now I can sharee my thoughts with you.
The late April was especially “rich” with news related to bugs, attacks and Android-targeting malware.
An update to RannohDecryptor now allows to beat a newer version of CryptXXX too.
Just took your new iPad out of the box? Here we explain how to make it more secure and easy to use
While many got a good laugh about CryptXXX evolving to beat out tool, ransomware is no laughing matter. Introducing V2 of our tool.
Gartner’s Magic Quadrant is a tool that helps to choose which vendor fits organizations best for a particular business purpose. It is designed for CIO’s, decision makers, and IT-security specialists of the businesses.
Your smartphone knows everything about you: whom you call and what messages you send, which websites you visit and what photos you take, including even when and where you do it. This data may be used against you.
A new APT group is seen to have been exploiting hotpatching, a now-deprecated feature in Windows operating systems, to carry out their attacks.