A photo editor with a difference
How a photo editor app from Google Play secretly signed up users for unwanted paid services.
1091 articles
How a photo editor app from Google Play secretly signed up users for unwanted paid services.
What the Hoax verdict means, and why such software is becoming more of a problem.
Scammers are using Google Calendar, Photos, Drive, and other services to distribute spam. Here’s how it works.
Scammers posing as CIA agents demand ransom for alleged possession of child porn, threatening arrest.
Tempted to stream Game of Thrones free? Be very cautious: You might pay for it with your passwords and credit card details.
A newly discovered vulnerability allows hackers to eavesdrop on WhatsApp users, read their chats, and install spyware just by calling them. Update the app now!
This phishing campaign is so convincing that even savvy YouTubers may be duped into giving crooks control of their accounts.
It seems the only reason to buy a “smart” padlock is to make lock-pickers happy.
Tempted to find the movie Avengers: Endgame online? Be cautious: A lot of websites promise to deliver but collect your passwords and credit card details instead.
Cybercriminals are hijacking routers to steal people’s credentials for online banking and services.
Fake technical support websites and accounts in social networks pose a real danger. How to spot and avoid them.
A look at the complexities of public attribution and why nation-states doing it will have real-world implications.
A cybergang that specializes in cyberespionage, with its campaign mostly limited to the Middle East and countries in central Asia.
How criminals use data harvested from users’ devices to fool antifraud systems and siphon money from victims’ accounts.
Everyone knows that EXE files can be dangerous for computers running Windows. But it turns out that EXE files can infect macOS too.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A bug in WinRAR allows malefactors to gain full control over your device. All they need you to do is unpack a rigged RAR file.
Systems designed to guard against car theft can be used to track, immobilize, and steal vehicles.
To hijack popular Instagram accounts, scammers are sending phishing e-mails with fake copyright infringement notifications.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.