Trojan embedded in fake Android smartphones
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
671 articles
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
We explain where and how to view porn without risking the security of your devices or your wallet.
Takeaways for regular crypto holders from the biggest crypto heist in history.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
Worried about your access to Telegram and its privacy after Pavel Durov’s arrest? Here’s what you should (and shouldn’t!) do right now.
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
Google has unveiled new privacy and security features coming to Android 15. We take a look at the innovations in the upcoming operating system update.
How to switch the cyber-protection on your computer or smartphone to the most awarded security solution from Kaspersky.
With the EU’s Digital Markets Act having come into effect just days ago, both alternative app stores and true third-party browsers are set to appear on iPhones. How will this affect security, and what are iOS users losing?
AI tools can be seen everywhere — from operating systems and office suites to image editors and chats. How do you use ChatGPT, Gemini, DeepSeek and the many add-ons to these without jeopardizing your digital security?
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
Android 13 and 14 have a feature called Restricted Settings. We explain its purpose, and how malicious applications bypass it.
Unused apps not only clutter your phone but also create a risk of personal data leakage, so it’s better to remove them. But what if an app can’t be uninstalled? There’s a workaround.
A look at the pros and cons of updating Android — and ways to do it safely.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.
The three most dangerous Android features that make your smartphone much more vulnerable to malware.
How to protect a company’s reputation from illegal use of its name on the internet.
You’re spending way more on subscriptions than you expect. How to take control of them and save money?
Web services and apps are part and parcel of the modern learning process — both online and offline. But they’re often insecure and pose a threat to your child’s personal data. How to stay safe?