Quantum of Lies
The complete story of the hype, panic, and misunderstanding surrounding attacks on cryptographic algorithms using quantum computers.
The complete story of the hype, panic, and misunderstanding surrounding attacks on cryptographic algorithms using quantum computers.
Hundreds of new gadgets and smart appliances are traditionally unveiled every January at the Consumer Electronics Show in Vegas. How will they affect our cybersecurity?
Dangerous features are creeping into legitimate Chrome extensions. How to keep your organization safe?
How to avoid giving away your password to scammers when logging in to third-party sites or viewing “encrypted” or “confidential” documents.
Attacks on companies via their suppliers and contractors are becoming increasingly widespread. How can you manage this risk?
European researchers have discovered a vulnerability in AMD processors that can be exploited by modifying RAM modules.
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Scammers have invented a new trick — they post cryptowallet seed phrases in YouTube comments using newly created accounts. Here’s how it works
The best privacy-focused services that make practical gifts for friends and family.
We explain how to detect if scammers have gained access to your Telegram account, and what to do about it.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.