
What to do, if someone really stole 1.2 BILLION passwords?
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
1441 articles
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
July is over and that means it’s time to look back and observe the latest results of the battle between cybercriminals and prosecutors.
In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.
In the news: Microsoft’s No-IP takedown fiasco, Chinese APT groups curious about U.S. Iraq policy, Verizon says the government wants locations data, and Microsoft denies backdoor insinuations.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
Facebook fails to fully encrypt data on its Instagram mobile app, which puts user security and privacy at risk.
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
If it is absolutely necessary that you check your email and the only way to do it is on a public computer, forward your email to a disposable email account like Mailinotor or Trashmail that has a short life and a timed expiration.
Know your sysadmin and what to expect from him. Don’t forget to congratulate the guy, today is Global Sysadmin day!
A new version of file-encrypting malware hides its sever inside an anonymous TOR network, making it safer for criminals to extort money from victims.
Most free apps are not actually free. They monetize on displaying ads to you ― and sometimes it is very annoying.
Igor Soumenkov, a Kaspersky Lab contributor to the Ubisoft’s Watch Dogs script assessment, explains how close to real life the game world is.
Making a case for password reuse, Google hiring hackers to fix the Internet, Apple bolsters security across its services with strong Crypto, plus various fixes and more.
Any new technology can be rough around the edges. The consequences can be complex and there’s high chance for human error, especially when it comes to security.
As ISPs push to make Wi-Fi more widely available outside the home, users are increasingly vulnerable to attacks that rely on rogue and malicious hotspots
If you think that threat isn’t real, ask Miss Teen USA 2013, whose webcam was hacked into and used to take nude photos of her.
These young researchers will shape cyberworld in the next decade.
Avoid becoming a victim as some of our friends did, watch your card closely.
Phishers exploit global World Cup interest with a campaign disguised as a petition to reinstate Luis Suarez. Microsoft patched 29 security vulnerabilities.