
Voice assistants hear things we don’t
We explain how ultrasound and audio recordings hidden in background noise can be used to control voice assistants.
3282 articles
We explain how ultrasound and audio recordings hidden in background noise can be used to control voice assistants.
When you’re ready to leave the privacy fever dream that is Facebook, make sure you have everything before you lock the door on your way out.
Changing passwords regularly is outdated. Use strong and unique passwords that are easy to remember instead. Here’s how to make them.
Crooks hacked telecom protocol SS7 to steal banking two-factor authentication codes.
Cybercriminals are bypassing mail spam filters by hiding documents with a malicious link in SharePoint Online.
Let’s take a look at a VPN from Facebook that is more than meets the eye, a bug in FaceTime, happy trails to Internet Explorer and good privacy work from Mozilla.
Analysis of a German sex toy reveals all sorts of vulnerabilities.
Our new partner program: What customers should know about Kaspersky United.
How do you explain the basic concepts of staying safe on the Internet to your kids? With a good book, of course!
Burnout caused by routine is a problem not only for employees, but for the entire company.
We sat down with David Emm to ask him what he’s looking forward to at this year’s Security Analyst Summit.
The Razy Trojan secretly installs malicious extensions for Chrome and Firefox to serve phishing links and steal cryptocurrency.
We look at some headaches for Google and Facebook, a “hacked” Nest sending out an ICBM warning, the Girl Scouts covering cybersecurity, and more.
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
WhatsApp and Facebook are swimming in links to ticket giveaways for fairs and airlines. Don’t get excited, though; the tickets are fake.
Ex-employees can go to extremes for the sake of revenge. How to terminate a work relationship safely and securely.
In this episode, Dave and Jeff plus some special guests talk travel and keeping your data safe.
A huge database of leaked e-mails and passwords surfaced in the Internet. Here’s what you should do about it.
In this episode, Jeff and Dave discuss getting back at telesales, the latest from CES, the Town of Salem breach, and some disturbing data sales by US telcos.
Security researchers found several ways to compromise hardware cryptocurrency wallets made by Ledger and Trezor.