The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
Dave and Jeff sit down with Marco Preuss to discuss the ethics of social ratings, masked selfies, and more.
How we optimized our solution for ATM protection, and why.
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
Security-as-a-Service is the future of information security.
This week Dave and Jeff take a look at a leaked Google Doc that the NHS would like to take back, unemployment scams in the US, a Star Wars–Top Gun mash-up, and more.
Another reason not to share everything online.
To ensure that a vulnerability disclosure doesn’t cause more problems than it solves, we recommend a few simple principles.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Hans Christian Andersen’s report on the Kai infection incident, and the investigation by infosec expert Gerda.
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.
A look at how the near-universal shift to working from home has affected employees’ lives and attitudes toward security.
A long time ago in a galaxy far, far away, a lone Mandalorian warrior suffered from cybersecurity issues, both other people’s fault and his own.
Payment terminals and ATMs in remote locations require a special approach to security.
Still using Windows 7? Time to go to Windows 10 — or beef up protection.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
Some say you can get malware on your iPhone simply by visiting a dangerous Web page. We examine the rumor to get at the truth.
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Age-based gaming ratings serve as a warning that the contents of the game may be unsuitable to children. We will review different rating systems used to label console and PC games.
Smartphones are always covered in bacteria, but viruses can also survive there, including COVID-19. We explain how to properly disinfect your smartphone.
Be it Fortnite, League of Legends, or good old Archero, risks abound for online gaming. Learn about the threats so you can avoid them.
A brief but comprehensive guide to security and privacy on the world’s most popular gaming platform.
If you don’t want to pay for extra gigabytes in iCloud, try these other ways to backup your photos and other iPhone files.
Inexpensive, no-fuss Burning Man tickets for sale online. Just one problem: They’re fake.