Never share verification codes
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
770 articles
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
Originally targeting users from Japan, Korea, and China, Roaming Mantis is quickly spreading worldwide, infecting smartphones through hacked wi-fi routers.
In this week’s podcast, Jeff and Dave riff on the Chili’s data breach, Facebook’s internal reviews, police falling victim to ransomware, and more.
Do you follow the news? The news may also be following you. ZooPark spyware targets those partial to politics.
Jeff and Ahmed discuss privacy online, the latest on Cambridge Analytica, and more.
This new version of SynAck ransomware uses sophisticated evasion techniques.
Jeff and Dave discuss a Facebook dating app, Twitter selling data to Cambridge Analytica, and more.
Fake airline giveaways won’t win you a ticket, but they might steal your data.
On this episode of the podcast, Jeff and David discuss personal data being sold on Facebook, cops trying to unlock an iPhone with a dead man’s finger, bad passwords, and more.
On this podcast, special guest David Emm joins David to talk data privacy, AI, and smart homes
Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.
On this week’s podcast, Jeff and David discuss Facebook fallout, Amazon’s “voice-sniffing” patent, and a paid version of Google.
Malefactors are massively exploiting a vulnerability in Cisco switches, taking down entire segments of the Web.
Jeff and Dave discuss the latest changes at Facebook, a data breach at Panera Bread, the fallout from the ransomware in Atlanta, and more.
Hidden miners detected in soccer and VPN apps on Google Play — steer clear!
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Jeff and Dave discuss deleting Facebook accounts, Earth not being flat, new cryptocurrency, and more.
The day I turned home network defender and stopped making fun of IoT developers.
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.