
825 articles
Any game based on the popular Unity engine made in the last eight years can allow attackers to get into your computer or smartphone. Here’s what to do about it.
We discovered a new wave of attacks on WhatsApp users in which attackers steal victims’ accounts using fake voting pages and social engineering on social networks.
Artificial intelligence has given scammers a new set of tools for deception — from generating deepfakes, to instantly setting up phishing websites or fraudulent email campaigns. Let’s discuss the latest AI trends in phishing and scams — and how to stay safe.
Official gaming websites and platforms may seem safe, but even there gamers occasionally encounter malware. We break down infection cases involving Endgame Gear, Steam, and Minecraft.
How 5G smartphone connectivity can be compromised, and what it means for subscribers.
Brushing, quishing, and other fraud schemes that begin with the delivery by courier of a product you never ordered.
Everything you need to know about the latest Telegram scams and phishing, and how to stay safe.
We’ve uncovered a new Trojan — Efimer — which steals cryptocurrency via the clipboard. Here’s how it functions, and how you can stay protected.
Deepfake videos, fraudulent Instagram and Facebook accounts, private WhatsApp chats: how Mark Zuckerberg’s social media platforms have become a primary tool for investment scammers.
The more jobs you juggle, the higher your exposure to personal cybersecurity risks — especially if you’re a Zoomer.
Attackers hijack Discord invite links and redirect victims to scam servers to install malware using the ClickFix technique.
Scammers are tricking people into giving up cryptocurrency through Google Forms surveys. Here is what they are doing and how to avoid falling victim to this scam.
Why advanced attackers are interested in your home Wi-Fi access points, and how they maintain control over your devices.
Scammers have figured out how to send text messages that actually bypass cellular networks. How does illicit “SMS blasting” work, why does it matter for travelers, and how to stay safe.
Funny hacks that became internet legends: talking traffic lights, a high-school Rickroll, robot vacuums on the rampage, a Lenovo defacement, and a Burger King hijack.
This marks the second time we’ve found a stealer Trojan in the App Store.
First, don’t panic. Second, change your passwords. What else? Read this blogpost to protect your accounts.
Malicious actors are busy setting up fake Netflix websites, trying to trick visitors into paying for supposedly legitimate subscriptions, and promising in-game currency and skins for popular games. How else are they scamming Gen Zers, and what can we do to fight back?