Faking out fake tech support
A criminal ring in India posed as technical support and tricked many people, but they couldn’t fool David Jacoby, our senior security researcher.
1447 articles
A criminal ring in India posed as technical support and tricked many people, but they couldn’t fool David Jacoby, our senior security researcher.
It is very possible that in the foreseeable future information will be stored in DNA, and the term “virus” will get back to its literal meaning.
Ransomware infects 2,000 SFMTA computers, makes Muni rides free for the weekend.
More than 70% of active Internet users have considered quitting their social networks. What do they have to lose?
Ransomware: a brief history, current situation, future predictions and how to solve the problem.
A study reveals that people are tired of social networks, but keep using them because they can’t break the ties.
You can catch a Trojan even if you visit only legitimate websites. This post explains how it happens and what you should do to protect yourself.
FAQ about ransomware: types, origins, dangers, and how you can stay safe
Facebook regularly changes its security settings. Take a look: A useful new setting may have appeared since the last time you checked.
An unwitting army of connected devices caused an insane disruption of major Internet sites. IoT users need to wise up.
It can be tempting to disregard software update notifications. Everything seems to be working fine. Sometimes programs behave oddly or crash after an update. And by the way, you have
Careless behavior online can have devastating personal and financial consequences. Here are seven common shortcuts to avoid.
ATMs will soon use fingerprint readers and iris sensors to identify customers. But is biometric authentication as secure as advertised?
Three months in, we report on the development of No More Ransom and the goals we’ve already achieved.
Everything you need to know about mobile banking Trojans and how to fight them.
We illustrate for the layman what a virtual private network is and why you need one.
Independent testing agency MRG Effitas put 16 security products through their paces against a battery of malware. Here are the results.