Lessons learned from the trojanized KeePass incident
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
475 articles
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
Newly discovered vulnerabilities in AirPlay allow attacks on Apple devices and other AirPlay-enabled products over Wi-Fi – including zero-click exploits.
A year after its disastrous announcement, Microsoft is finally launching its AI-powered Recall feature on Copilot+ PCs. Is the new version secure, and what’s actually changed?
A popular blogger’s Instagram account was hijacked using a SIM-swap attack, and deepfakes were generated to scam followers.
A dozen short and simple tips on how to use WhatsApp, Telegram, Signal, iMessage, WeChat, and other messaging apps safely and hassle-free.
Cybercriminals are inventing new ways to swipe money from payment cards by using credentials phished online or over the phone. Sometimes, just holding your card to your phone is enough to leave you penniless.
Apple’s Find My network can be exploited to remotely track other vendors’ Android, Windows, and Linux devices.
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
If you still think that Steam, Google Play, and the App Store are malware-free, then read this fascinating story about PirateFi and other hacker creations disguised as games.
Everything you wanted to know about meme cryptocurrencies — such as TRUMP and DOGE — and ways to win or lose big.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
It feels as if spam is as old as the internet itself. The post looks at the money-making scams devised over the years, and how to avoid them today.
Every file, video, etc. we share contains a lot of hidden additional information — metadata. What’s it for, and is it really necessary?
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
The best privacy-focused services that make practical gifts for friends and family.
How a simple, well-known general threat became a key targeted-attack vector on companies.
Is a taped-over webcam or phonecam a sign of paranoia – or smart thinking?
Scammers posing as buyers snatch one-time codes during online product demos.
Cybercriminals are enticing Telegram users with free subscriptions. Is this an unexpected act of generosity or just another scam?