
NRansom: Ransomware that demands your nudes
A new blocker called nRansom locks users out of their computers and demands not money, but nude pictures.
1165 articles
A new blocker called nRansom locks users out of their computers and demands not money, but nude pictures.
Transatlantic Cable Podcast episode 4: tax scams, trading data for swag, AI password cracking, and more.
A few more tips about gaming accounts safety, or How to protect your Steam, Uplay, Origin, battle.net and so on.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
In this week’s Transatlantic Cable podcast, we discuss the recent iPhone X FaceID feature, a casino hacked using a fish-tank, HMRC bugs as well as the Equifax breach and more.
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
Cryptocurrency mining is an IT industry buzzword and a rapidly growing phenomenon. As part of this far-reaching trend, more and more people take up “mining,” or adding blocks to a
Transatlantic Cable Podcast episode 2: autonomous pizza delivery, Sarahah’s privacy issues, reprieve for victims of Yahoo!’s data breach and more.
This week’s Transatlantic Cable podcast features stories on Burger King, scams, Instagram security and more.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
Modern technology actually helps phone scammers — what you need to know to stay safe.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Facebook’s Alex Stamos explains why the information security industry has the wrong priorities and what should be done about it.
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?
At the Black Hat conference, researchers demonstrated that typing on the keyboard while talking on Skype is not safe.
In an earlier post from Black Hat, I discussed how car washes could be hacked. Today, we can remove the “wash” part and simply focus on the car. More specifically,
Global IT security problems like the recent Petya attack are of clear concern to large corpora-tions — but they affect common people as well.
A new ransomware outbreak is happening right now. Here’s what we know so far and what you can do to protect yourself from the threat.