
Naked online: cyberthreats facing users of adult websites and applications
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
127 articles
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
The Skygofree Trojan comes with a powerful array of spyware features, some unique — like turning on audio recording by geolocation and stealing private messages.
The new Loapi Trojan will recruit your smartphone for DDoS attacks, bombard it with ads, or use it to mine cryptocurrency, making it red-hot.
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
The CryptoShuffler Trojan does its utmost to go unnoticed, stealing Bitcoins on the sly.
POST IS BEING UPDATED LIVE. The world is being hit with yet another ransomware epidemic. It’s called Bad Rabbit, and here’s what we know about it so far.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Global IT security problems like the recent Petya attack are of clear concern to large corporations — but they affect common people as well.
Major pain: Critical infrastructure objects are among ExPetr’s (also known as NotPetya) victims.
A new ransomware outbreak is happening right now. Here’s what we know so far and what you can do to protect yourself from the threat.
Many users of devices running Android are tempted to root them. Here we explain the good and bad sides of having superuser rights.
Applications that offer to pay you for installing other applications tend to shove malware at you.
Embedded systems demand special protection from infections similar to WannaCry.
By now, everyone has heard about the WannaCry ransomware attack. So far we have two posts about it: one with a general overview of what happened, and another with advice
What makes the self-replicating encryptor WannaCry so dangerous and how to prevent infection.
An unconventional Android Trojan does not do anything to your smartphone; instead it hacks the Wi-Fi hotspot the smartphone is connected to.
What is ransomware? Why do you need to know about it? And how can you protect yourself from it?
Ransoc ransomware gathers data from victim’s social networks and hard drives, and uses it to blackmail victims.