A year after discovery, the Log4Shell vulnerability is still making itself felt.
Avast solutions have a pretty good reputation, but a handful of incidents call their safety into question. Read on to learn whether Avast can be trusted.
We investigate the connection between software security and leaks when handling RAM.
New CryWiper malware irreversibly corrupts files posing as ransomware.
The specifics of protecting and updating the OT infrastructure.
How to watch the World Cup and not get scammed.
Every year, the number of tasks we entrust to machines rises steadily. How safe is this?
In the final part of the series, we take a look at cryptocurrency politics, the future, and the metaverse.
Why might a business email contain a link to Google Translate?
Is it possible to make a hack-proof system?
Our research reveals gamers’ attitudes toward computer performance — and the ethics of winning and losing.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
Miners still pose a threat to businesses — especially ones that use cloud infrastructure.
Research on an unusual way to steal passwords: using a thermovisor.
An interesting bug in one of the most popular embedded DBMS.
What signs may indicate that a device is infected or being attacked by a hacker.
Which corporate assets should be first in line for protection against cyberattacks?
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Prioritize updating the apps that keep your devices and personal data safe from cyberattacks.
Dangerous vulnerability in WebKit (CVE-2022-22620) is believed to be actively exploited by hackers. Update your iOS devices as soon as possible!
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
The APKPure app store has been infected by a malicious module that downloads Trojans to Android devices.
New vulnerability CVE-2022-30190, aka Follina, allows exploitation of Windows Support Diagnostic Tool via MS Office files.
What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
Here are some simple tips to protect your funds from fraudsters, phishers and carders when shopping online.
How things are privacy-wise on the social network Poparazzi.
We explain how to best secure your Vivino profile.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.