Zoom 5 moves toward security
Zoom developers have made their service more secure. We review what’s changed.
3876 articles
Zoom developers have made their service more secure. We review what’s changed.
Our experts uncovered a scheme to extract cardholder data using Google tools.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
To protect ADAS from external interference, cars need a special approach to cybersecurity.
Digitalization opens up great opportunities, but at the same time it means that exposure to cyberthreats is increasing. What should we do about that?
A particular type of malware seeks user credentials, including accounts for gaming services such as Origin, Battle.net, and Uplay.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
We explain how to keep your computer running fast without sacrificing protection.
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
The abundance of work-related cloud tools and services calls for smart password handling.
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
Alongside their benefits, cloud solutions for file storage and document or project management can cause many problems.
How to find an individual approach for each employee without committing to a personal mentor for everyone.
It’s hard not to worry when you don’t know where your child is. We explain how to pinpoint their location and save your nerves.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
Your parents brought you into the digital world. Time to return the favor and raise them right as well.