New Google Play policy cuts both ways
Apps that demand access to calls and SMS messaging without good reason are being kicked off Google Play. We explain what threats might arise.
1183 articles
Apps that demand access to calls and SMS messaging without good reason are being kicked off Google Play. We explain what threats might arise.
Our technologies detected a threat that seems to be one of the biggest supply-chain attacks ever.
Do not expect data encrypted by ransomware to be restored easily. It is better to protect the data in the first place.
To reduce the attack surface you can block many vulnerable features of software. The question is, how can you do that but not interfere with business-processes?
Despite the plunge in cryptocurrency values, not only has cryptojacking not declined, it is growing rapidly.
The hidden dangers of out-of-office messages.
On March 8, people around the world celebrate the 110th International Women’s Day. This year’s theme, #BalanceforBetter, celebrates women’s achievements and encourages debate on why a gender-balanced world is a better world for everyone.
Analysis of Sauron’s hacking tools implemented in the devices known as Rings of Power.
Adult websites are often seen as a security threat, but few know that Trojans could be after their porn site accounts.
Can an ATM turn into a slot machine? WinPot malware helps its owners win big at the “ATM game.”
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
Scammers are sending tons of YouTube direct messages pretending to be from top YouTubers. They’re phishing. Here’s how the scheme works.
Cybercriminals are bypassing mail spam filters by hiding documents with a malicious link in SharePoint Online.
The Razy Trojan secretly installs malicious extensions for Chrome and Firefox to serve phishing links and steal cryptocurrency.
Employees going away for the winter break? We explain what to do to keep trips from turning into corporate data leaks.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
Why you shouldn’t open messages with e-cards from strangers, or believe that someone gave you an Amazon gift card for Christmas.
How cybercriminals blocked Marcie’s iPhone, and how to avoid a similar fate.
Thanks to our proactive technologies, zero-day vulnerability CVE-2018-8611 was neutralized.