Mobile beasts and where to find them — part four
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
737 articles
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
One short message is enough to send a Sony PS4 into an infinite restart loop. Here’s how to deal with it.
Facebook has been breached, and malefactors gained access to some 50 million accounts. We offer some quick tips for your safety.
Android lets you configure app permissions to protect your data and restrict access to dangerous functions. We explain how to do it and why.
Let’s talk about mobile malware that can empty your bank account or spy on you.
Which is older, the phone or the fax? Is it true that no one faxes anymore? And can a fax machine be hacked? (Spoiler: yes)
Due to certification centers specifics, it is not rare for other people to hold a valid HTTPS certificate for your domain. What can go wrong?
How a seemingly harmless Android application can infect your smartphone using shared external storage.
The infamous Lazarus group’s newest campaign is really hard to detect. Bonus: How cryptocurrencies, cybercriminals, and ramen noodles are connected.
Instagram hacking has been on the rise lately. Here’s what you need to know to avoid losing your precious account.
Are the IoT’s security issues placing the industry on the road to a litigation nightmare?
Almost half of the most-visited websites open visitors to potential dangers. What can you do?
When it comes to online accounts, voicemail is a major security hole. Here’s why.
KeyPass ransomware is infecting computers worldwide, encrypting almost everything in its path. And it all starts with downloading a seemingly innocuous installer.
How security researchers were able to track down cryptocurrency bots on Twitter.
Take a stroll through your apps and you’re bound to encounter some unfamiliar names. Where do those unaccounted-for apps on your PC come from, and are they safe?
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.
When I fell victim to sleight of hand and a little bit of fraud, Find My iPhone didn’t save me. Here’s why.
The recently leaked source code actually isn’t Carbanak — it’s another advanced financial malware family. And the leak will likely have a huge ripple effect.
No PIN on your phone? Pickpockets will thank you for that.