Attack on cybersecurity researchers: pseudo-exploit for regreSSHion
Someone is targeting security experts using an archive that allegedly contains an exploit for the regreSSHion vulnerability.
217 articles
Someone is targeting security experts using an archive that allegedly contains an exploit for the regreSSHion vulnerability.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Korean filmmakers have made a film about cybercrime that deserves a look — if only as a training tool.
The new version of Prilex malware, used to attack POS terminals, now can block NFC transactions.
What signs may indicate that a device is infected or being attacked by a hacker.
The top-4 technologies in use today that long belong in a museum.
Although malware most often infiltrates corporate infrastructure through e-mail, it’s not the only infection method.
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
Malicious spam campaign targeting organizations grows 10-fold in a month, spreads Qbot and Emotet malware.
In 2021 there were fewer attacks on smartphones and tablets than in 2020. But that’s no reason to relax, and here’s why.
The geopolitical conflict in Ukraine is the latest example of malicious actors trying to cash in on unsuspecting victims.
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
Endpoint protection alone may not be strong enough to support the complex cyberthreats many businesses now face. Here’s how to decide on the solutions you need.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
Dave and Jeff talk about the UK government considering the use of artificial intelligence for espionage, Google’s continued fight against COVID-19 phishing, and more Zoom headaches.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Dave and Jeff discuss MI5 pushing for weak encryption, the EU commission telling employees to use Signal, smart pet feeders going offline, and more.
Fear of the coronavirus is being leveraged by cybercriminals online to spread trojans and malware.