The Rotexy Trojan: banker and blocker
We take a look at the Rotexy mobile Trojan: where it comes from, how it behaves, and how to get rid of it using a couple of regular SMS.
1091 articles
We take a look at the Rotexy mobile Trojan: where it comes from, how it behaves, and how to get rid of it using a couple of regular SMS.
Twitter cryptocurrency scams are becoming more and more advanced and convincing, with scammers using new techniques and some heavy artillery.
Epidemics, espionage, destruction: We present the most memorable cyberattacks of recent years.
The personal data of 257,000 Facebook users, including private messages belonging to 81,000 of them, has leaked online. Hackers claim to have access to 120 million accounts.
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
One short message is enough to send a Sony PS4 into an infinite restart loop. Here’s how to deal with it.
Facebook has been breached, and malefactors gained access to some 50 million accounts. We offer some quick tips for your safety.
Android lets you configure app permissions to protect your data and restrict access to dangerous functions. We explain how to do it and why.
Let’s talk about mobile malware that can empty your bank account or spy on you.
Which is older, the phone or the fax? Is it true that no one faxes anymore? And can a fax machine be hacked? (Spoiler: yes)
Due to certification centers specifics, it is not rare for other people to hold a valid HTTPS certificate for your domain. What can go wrong?
This new version of SynAck ransomware uses sophisticated evasion techniques.
How a seemingly harmless Android application can infect your smartphone using shared external storage.
The infamous Lazarus group’s newest campaign is really hard to detect. Bonus: How cryptocurrencies, cybercriminals, and ramen noodles are connected.
Instagram hacking has been on the rise lately. Here’s what you need to know to avoid losing your precious account
Almost half of the most-visited websites open visitors to potential dangers. What can you do?
When it comes to online accounts, voicemail is a major security hole. Here’s why.
How security researchers were able to track down cryptocurrency bots on Twitter
Take a stroll through your apps and you’re bound to encounter some unfamiliar names. Where do those unaccounted-for apps on your PC come from, and are they safe?
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.