How to launch malicious macros unnoticed on macOS
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
770 articles
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
How attackers hunt for Battle.net accounts in World of Warcraft, aiming to get valuable content.
We examined the contents of Kaspersky’s CEO’s spam folder to find out what spammers and phishers think might entice him.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
A particular type of malware seeks user credentials, including accounts for gaming services such as Origin, Battle.net, and Uplay.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
Kaspersky researchers publish a decryptor that can help get back files encrypted by all strains of Shade/Troldesh ransomware.
Kaspersky experts found the PhantomLance Trojan backdoor for Android in Google Play.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
Attackers are infecting users’ computers with a backdoor posing as an Adobe Flash Player update.
During a cyberattack in Hong Kong, LightSpy spyware infected the iPhones of people visiting counterfeit news sites.
Microsoft has posted a security advisory about vulnerabilities in Adobe Type Manager Library, which are already being exploited by cybercriminals.
Be it Fortnite, League of Legends, or good old Archero, risks abound for online gaming. Learn about the threats so you can avoid them.
MonitorMinor is one of the most dangerous spying apps for Android out there. Here’s why.
Microsoft has released a patch for newly discovered critical vulnerability CVE-2020-0796 in the network protocol SMB 3.1.1.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Victor Chebyshev talks about the most common mobile threats and attack vectors of 2019.
Inexpensive, no-fuss Burning Man tickets for sale online. Just one problem: They’re fake.
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
Phishers are using the Wuhan coronavirus as bait, trying to hook e-mail credentials.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?