Security tips for gamers: how to keep your precious elf safe
Gaming is enormously popular. Thus, it’s an easy target for cybercriminals looking for a never-ending source of money.
965 articles
Gaming is enormously popular. Thus, it’s an easy target for cybercriminals looking for a never-ending source of money.
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.
Anyone who goes online could be hacked. During Christmas time, this possibility doubles as we make a number of purchases and get so excited that we forget about security.
A new variant of the Zeus banking trojan has emerged, targeting consumer accounts at 150 banks in 15 countries.
Kaspersky Lab experts unveiled new Linux-targeting malware related to the infamous Turla APT. Such modules were known to exist before, but never met in the wild. Until now.
The RedOctober operation was hastily wrapped-up just after a Kaspersky Lab’s publication in January 2013, but it was expected to return. And it did.
Sony Pictures Entertainment fell victim to a massive hack. Attackers used destructive malware to bring SPE networks down, while stealing up to 11 TB of data, which included both trade secrets, yellow press fodder, passwords to social networks accounts, and a lot of private information.
Cybercrime is a rather lucrative business. Cybercriminals are earning a lot, or at least their effort-to-profit rate is good enough for them to keep going. But how good is it?
Online games these days are products of years of development with budgets approaching those in Hollywood, and with similar marketing support. And if we speak of massively multiuser online games
Recent news concerning “hacked webcams” or “breached baby monitors” appears to be all over the place. Let’s take a closer look at the situation.
Medieval doors were extremely sturdy due to their two-layer construction and different wood grain directions across those layers. Multilayered defensive structures is a must in cybersecurity as well.
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
Securelist has published extensive research on BlackEnergy. Initially a DDoS crimeware, it turned into a huge collection of various tools currently used in various APT-type activities, including some “significant geopolitical operations”.
Kaspersky Lab has just announced the discovery of an alarming APT campaign codenamed “Darkhotel,” targeted mainly at business executives staying at certain hotels in Asia. Luxury hotels offer not just places to stay, but also comfort and privacy. However, their cybersecurity occasionally fails.
Kaspersky Lab revealed a cyberspy campaign, Darkhotel, which had been active for seven years in a number of luxury Asian hotels.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Internal and external threats may be quite different in nature, but they demand equal attention from the IT staff in order for the protection to be complete.
We’re taking a look at the security features in the new version of Mac OS X – Yosemite. Apple makes a decent effort.
Hotels offer not just free WiFi but occasionally even free use of devices such as iPads these days. While it is really nice, a misconfigured device like this may store just a bit too much personal data, easily retrievable by the next visitor…
Linux bugs may affect or directly threaten entire virtualization infrastructures: Whatever OS is used on VMs, an attack on a hypervisor is possible from both the outside and inside, and exploitation of the dreaded Shellshock vulnerability on Linux-based hypervisors is a possibility, too.