What just hit the fan: FAQs
What Russian hackers, American spies, the Israeli Intelligence Service, and Kaspersky Lab have to do with each other. What is happening, anyway?
4007 articles
What Russian hackers, American spies, the Israeli Intelligence Service, and Kaspersky Lab have to do with each other. What is happening, anyway?
In this week’s edition of the Transatlantic Cable podcast, we discuss Equifax, PornHub, pulled AI and more.
Most of those leaks could have been prevented with a timely audit of the IT infrastructure.
Our research shows most users of online dating sites fudge information about themselves. Why they do it and what you can do about it.
One of the most popular porn sites in the world was serving malware through ads to millions of its users.
The real scale of the Yahoo breach (spoiler: 3 billion), Facebook’s own Face ID, UK Lottery DDoS, and more.
What if you could pay with your personal data for goods – as if it was some sort of currency? Sounds attractive… or scary?
Let’s celebrate by sharing some advice with those who need it. Here are five tips you can use to help your friends and relatives stay safe online.
The largest motor show in the world is the best place to see what cars will look like in the near future.
Think you can do better than a machine-learning algorithm and hunt down threats in the making? Take our quiz and find out!
Let’s talk about solving blockchain’s six main problems to help it work better, faster, and more efficiently.
Transatlantic Cable Podcast episode 4: tax scams, trading data for swag, AI password cracking, and more.
A new blocker called nRansom locks users out of their computers and demands not money, but nude pictures.
A few more tips about gaming accounts safety, or How to protect your Steam, Uplay, Origin, battle.net and so on.
In the modern threat landscape, passive security strategy should be reinforced with new methods, such as endpoint detection and response solutions.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
Tools for giving a well-reasoned explanation of why security solutions are a must-have