What is PoS malware and why does it cost millions
PoS malware is a long-standing problem which caught the public’s attention only recently. It came out with a loud bang: The repercussions of Target’s drastic data breach are still around.
892 articles
PoS malware is a long-standing problem which caught the public’s attention only recently. It came out with a loud bang: The repercussions of Target’s drastic data breach are still around.
Sextortion is one way online predators can steal your sensitive data and use it to harm you.
We have bought our very own Blackphone to check its security firsthand.
In this short video, we will explain six steps you can take to conveniently maximize the security of your PayPal account.
Is social engineering beatable? Just as much as you can beat any other kind of deceit. Actually, social engineering is about “exploiting flaws in a human hardware”.
Kaspersky Lab released results of a 10-months long analysis of Epic Turla APT campaign, which is still active. One of the most sophisticated cyber-espionage campaigns, it attacked victims in 45 countries.
July is over and that means it’s time to look back and observe the latest results of the battle between cybercriminals and prosecutors.
Security researchers uncovered yet another long-standing APT campaign aimed at exfiltration of important data from the organizations associated with strategic industrial sectors. Once again, businesses involved in these areas are
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
Spam levels have dropped globally and it’s not a seasonal fluctuation. There is indeed less spam now in e-mail traffic. Can spam ever be beaten altogether?
Gameover ZeuS botnet is a 3-y.o. headache for security experts and users alike. It took a global operation to dismantle its C&C servers, but experts acknowledge that the botnet will most likely be back in a few weeks. Why is it so hard to beat this Hydra?
“Trojan” in computing is a misleading shortening from the self-descriptive “Trojan horse”, the ubiquitous and probably the most dangerous sort of malware.
Making a case for password reuse, Google hiring hackers to fix the Internet, Apple bolsters security across its services with strong Crypto, plus various fixes and more.
Phishers exploit global World Cup interest with a campaign disguised as a petition to reinstate Luis Suarez. Microsoft patched 29 security vulnerabilities.
Criminals invented Cryptolocker, spying malware and Zeus banking Trojan. We have new protection against them.
The first summer month brought us news about the eternal confrontation of law enforcements and cybercriminals. Let’s see who was busted in June.
New analysis pinpoints some weaknesses in a new generation of cars with online capabilities. If exploited, this may result in car theft and other problems.
Miniduke APT campaign is reactivated. The malware received a number of updates, and a large part of it is apparently intended to throw off researchers. Not exactly a successful endeavor.
When a computer is operated by a child, it should be protected against a whole new set of threats. Some popular security solutions fail to provide sufficient protection.
Free antivirus programs offer basic protections, but in order to be protected against phishing attacks that can steal your personal and financial data you need an Internet browser security program.