
Browser-in-the-browser attack: a new phishing technique
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
32 articles
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
Twitter has taken actions to prevent attacks with strobing images on people with epilepsy. Are these actions sufficient?
Epidemics, espionage, destruction: We present the most memorable cyberattacks of recent years.
Malefactors are massively exploiting a vulnerability in Cisco switches, taking down entire segments of the Web.
What 2017 will be remembered for, which of our experts’ predictions came true, and what they think about the future
Did our 2016 predictions come true? Let’s see and try to forecast what awaits the security industry in 2017.
Konstantin Goncharov recaps the most significant security events of 2015.
At the start of each year, many people make resolutions to better themselves, but for many of them those efforts have dissipated by the time February rolls around. Well, the
The world of Web apps has grown at a breakneck pace in recent years. That’s been good news for consumers and it’s been utterly fantastic news for attackers, who have