
Dangerous liaisons: How relatives and friends give away your secrets
Your online privacy does not depend solely on you. We’ll tell you what your loved ones can give away. (Spoiler: It’s absolutely anything, even DNA.)
119 articles
Your online privacy does not depend solely on you. We’ll tell you what your loved ones can give away. (Spoiler: It’s absolutely anything, even DNA.)
In the Netherlands, the creators of one of the first ransomware cryptors are on trial, thanks largely to us.
Jeff and Dave discuss a Facebook dating app, Twitter selling data to Cambridge Analytica, and more.
The days of dropping cheesy pick-up lines at social gatherings are coming to an end. With dating websites and apps, it has become way easier to find a partner online. But is it safe?
A story of two amateurs who were able to spy on Italian officials for years without getting caught.
A criminal ring in India posed as technical support and tricked many people, but they couldn’t fool David Jacoby, our senior security researcher.
Ransoc ransomware gathers data from victim’s social networks and hard drives, and uses it to blackmail victims.
Three months in, we report on the development of No More Ransom and the goals we’ve already achieved.
How Kaspersky Lab helped the Russian police catch the cybercriminals behind the Lurk banking Trojan and Angler exploit kit.
What lessons can businesses learn from the story of our investigation of the activity of the Lurk gang?
In this roundup, we talk about five true leaks and some lessons to be learned from them.
True tales of rigged lotteries, stolen millions, and the investigations that brought the thieves down.
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Everything you need to know about safe posting on any social network, boiled down to five crucial rules.
If the rumours are true, 40 million Apple iCloud accounts have been hacked.
We’ve seen drones armed with chainsaws and guns. More alarming though is how easily they can be hacked.
Yet another ZeuS variant is threatening businesses.
What happens when real cyber experts head to TV to stop cybercrime?
Observing cybercriminals’ behaviour one can find consistent patterns and thus find out who the criminal is in real life