How to recognize a deepfake: attack of the clones
Learn how to spot deepfakes in photos, videos, voice messages, and video calls in real time.
705 articles
Learn how to spot deepfakes in photos, videos, voice messages, and video calls in real time.
NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.
How criminals exploit the familiar “tap your phone to pay” feature to steal your money.
We break down a new scam that leverages Telegram Mini Apps, and explain how to avoid taking the bait.
How to eliminate the threat posed to organizations by ownerless servers and services, outdated libraries, and insecure APIs.
From karaoke rooms to gynecology clinics — these are just some of the tens of thousands of locations where compromised IP cameras were discovered in South Korea. Here’s how to avoid unwittingly starring in steamy videos you didn’t authorize.
Millions of websites based on React and Next.js contain an easy-to-exploit vulnerability that can lead to complete server takeover. How to check if your server is vulnerable, and protect corporate web assets?
How researchers hacked DeckMate 2 card shufflers, and how the mafia exploited those very vulnerabilities to cheat at poker.
How attackers use AI-generated fake websites to distribute trojanized builds of the legitimate Syncro remote access tool (RAT).
A step-by-step guide to deleting as much of your digital footprint as possible.
Any game based on the popular Unity engine made in the last eight years can allow attackers to get into your computer or smartphone. Here’s what to do about it.
A close look at attacks on LLMs: from ChatGPT and Claude to Copilot and other AI-assistants that power popular apps.
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
We explore which messaging apps let you chat without an internet connection or cell service, and why you might need this.
We look at how AI can help you plan your vacation — and what can go wrong.
Deepfake videos, fraudulent Instagram and Facebook accounts, private WhatsApp chats: how Mark Zuckerberg’s social media platforms have become a primary tool for investment scammers.
Attackers hijack Discord invite links and redirect victims to scam servers to install malware using the ClickFix technique.
Why advanced attackers are interested in your home Wi-Fi access points, and how they maintain control over your devices.