On this podcast, Dave and Jeff discuss the latest scam targeting Travelex customers, a phishing attack on the UN, Australia relief being targeted by Magecart, and more.
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
A bug in WinRAR allows malefactors to gain full control over your device. All they need you to do is unpack a rigged RAR file.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
Can an ATM turn into a slot machine? WinPot malware helps its owners win big at the “ATM game.”
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Epidemics, espionage, destruction: We present the most memorable cyberattacks of recent years.
Freelancers are beloved targets for cybercriminals, who use phishing and malware to steal credentials and money. Here’s how to avoid their traps and stay safe.
Let’s talk about mobile malware that can empty your bank account or spy on you.
Almost half of the most-visited websites open visitors to potential dangers. What can you do?
KeyPass ransomware is infecting computers worldwide, encrypting almost everything in its path. And it all starts with downloading a seemingly innocuous installer.
In this edition of the podcast, Jeff and Dave discuss the Black Hat USA conference, a downside of Fortnite coming to Android, the Reddit hack, and our latest report on the state of malware.
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.
The recently leaked source code actually isn’t Carbanak — it’s another advanced financial malware family. And the leak will likely have a huge ripple effect.
In part one of our mobile malware series, we cover infectious Android malware — adware, subscribers, and flooders — and how mobile viruses can damage your smartphone or tablet…
Did you see that new fully loaded Android smartphone, the one that looks too good for the price? Well, it may include some unwanted extras.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
At the Security Analyst Summit, our researchers showcase how a Brazilian group steals card information and creates clones of chip-and-PIN cards.
Our experts analyzed last year’s financial cyberthreats, and here is their report
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
These holiday season tips are relevant year-round