Trojans in AI models
Hidden logic, data poisoning, and other targeted attack methods via AI systems.
612 articles
Hidden logic, data poisoning, and other targeted attack methods via AI systems.
This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification — yet it still completely misses the mark.
Why and how to create a local backup of cloud data, taking Notion as an example.
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
Tips on how to watch the UEFA Euro 2024 tournament while keeping your money safe and your mood good.
Vehicle makers sell the data collected by connected cars about their users’ driving habits to data brokers – who resell it to insurance companies.
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
Proxyware can make it difficult to detect cyberattacks on organizations — sometimes making the latter unwitting accomplices in crimes.
In 2023, our products and solutions took part in precisely 100 independent studies — winning 93 times: our best year ever.
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
VoltSchemer attacks on wireless Qi chargers using modified power sources can “fry” smartphones and other devices, as well as issue commands to voice assistants.
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
Getting what you pay for: cracked macOS apps fetch malicious code from DNS records to steal crypto
Ethical hackers told 37C3 how they found a few eye-openers while breaking DRM to fix trains.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
We look at a new sophisticated attack on AMD and Intel integrated graphics cards.
We take a look at drivers: why we need them, the threats they pose, and how to keep your computer secure.
A few words on why desktop applications based on the Electron framework should be approached with caution.