
Meme coins and NFTs: How not to lose your shirt
Everything you wanted to know about meme cryptocurrencies — such as TRUMP and DOGE — and ways to win or lose big.
385 articles
Everything you wanted to know about meme cryptocurrencies — such as TRUMP and DOGE — and ways to win or lose big.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
Banshee stealer, a macOS stealer that emerged last year, is now roaming free on the Web, infecting Mac users and gaining new capabilities. How to protect yourself?
Scareware is malware that scares users into doing something risky. Here’s how it works.
Every file, video, etc. we share contains a lot of hidden additional information — metadata. What’s it for, and is it really necessary?
The complete story of the hype, panic, and misunderstanding surrounding attacks on cryptographic algorithms using quantum computers.
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
Scammers have invented a new trick — they post cryptowallet seed phrases in YouTube comments using newly created accounts. Here’s how it works
How a simple, well-known general threat became a key targeted-attack vector on companies.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.
Hidden logic, data poisoning, and other targeted attack methods via AI systems.
Scammers posing as buyers snatch one-time codes during online product demos.
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
A detailed guide to configuring privacy settings in the ASICS Runkeeper running app.
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
A detailed guide on setting up privacy in the adidas Running app.