10 high severity vulnerabilities in Google Chrome
The recent Google Chrome update patches 10 high severity vulnerabilities and a dozen of less critical bugs. Time to update your browser!
3876 articles
The recent Google Chrome update patches 10 high severity vulnerabilities and a dozen of less critical bugs. Time to update your browser!
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
In 2021 there were fewer attacks on smartphones and tablets than in 2020. But that’s no reason to relax, and here’s why.
Hackers from Lapsus$ group claim they breached Okta, a major provider of access management systems.
What is a seed phrase, how scammers use it to steal cryptowallets, and how to protect your MetaMask account.
Eugene’s open letter in response to the warning against the use of Kaspersky products by the German Federal Office for Information Security (BSI).
The geopolitical conflict in Ukraine is the latest example of malicious actors trying to cash in on unsuspecting victims.
We reveal more cunning cybercriminal tricks and explain how to guard against scams.
HermeticRansom cryptor was used as a distraction to support HermeticWiper attacks.
Anti-phishing lessons: what company employees should know about fake notifications about account security.
How threat intelligence helps prevent cyberattacks on enterprises.
In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.
Dangerous vulnerability in WebKit (CVE-2022-22620) is believed to be actively exploited by hackers. Update your iOS devices as soon as possible!
How to update Google Chrome right when you really need to, and what to do if you run into problems.
Methods of reasonable protection against potential freelancer related cyberthreats.
How to protect your iPhone or Android smartphone from Pegasus and similar mobile APTs.
Does hardware vulnerabilities in CPU pose a practical threat to businesses?