
Beware of stealers disguised as… wedding invitations
Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.
220 articles
Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.
Banshee stealer, a macOS stealer that emerged last year, is now roaming free on the Web, infecting Mac users and gaining new capabilities. How to protect yourself?
Scareware is malware that scares users into doing something risky. Here’s how it works.
Someone is targeting security experts using an archive that allegedly contains an exploit for the regreSSHion vulnerability.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Korean filmmakers have made a film about cybercrime that deserves a look — if only as a training tool.
The new version of Prilex malware, used to attack POS terminals, now can block NFC transactions.
What signs may indicate that a device is infected or being attacked by a hacker.
The top-4 technologies in use today that long belong in a museum.
Although malware most often infiltrates corporate infrastructure through e-mail, it’s not the only infection method.
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
Malicious spam campaign targeting organizations grows 10-fold in a month, spreads Qbot and Emotet malware.
In 2021 there were fewer attacks on smartphones and tablets than in 2020. But that’s no reason to relax, and here’s why.
The geopolitical conflict in Ukraine is the latest example of malicious actors trying to cash in on unsuspecting victims.
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
Endpoint protection alone may not be strong enough to support the complex cyberthreats many businesses now face. Here’s how to decide on the solutions you need.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
Dave and Jeff talk about the UK government considering the use of artificial intelligence for espionage, Google’s continued fight against COVID-19 phishing, and more Zoom headaches.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.