
Naked online: cyberthreats facing users of adult websites and applications
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
96 articles
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
The Skygofree Trojan comes with a powerful array of spyware features, some unique — like turning on audio recording by geolocation and stealing private messages.
The CryptoShuffler Trojan does its utmost to go unnoticed, stealing Bitcoins on the sly.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Global IT security problems like the recent Petya attack are of clear concern to large corpora-tions — but they affect common people as well.
A new ransomware outbreak is happening right now. Here’s what we know so far and what you can do to protect yourself from the threat.
Many users of devices running Android are tempted to root them. Here we explain the good and bad sides of having superuser rights.
Embedded systems demand special protection from infections similar to WannaCry.
Applications that offer to pay you for installing other applications tend to shove malware at you.
What makes the self-replicating encryptor WannaCry so dangerous and how to prevent infection.
An unconventional Android Trojan does not do anything to your smartphone; instead it hacks the Wi-Fi hotspot the smartphone is connected to.
What is ransomware? Why do you need to know about it? And how can you protect yourself from it?
Ransoc ransomware gathers data from victim’s social networks and hard drives, and uses it to blackmail victims.
We explain three important concepts underlying antivirus action: signatures, the nature of viruses, and how antivirus solutions remove malware.
We discovered a Pokémon Go Trojan in Google Play. It had already been downloaded 500,000 times.
Digital advertising brings money to companies and relevant ads to you and me — and attracts fraud. How does it all work?
Fantom ransomware displays a fake Windows Update screen while encrypting your files.
Some Android Trojans can write reviews and rate apps on behalf of users, but without their consent.
Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.