How cybercriminals defraud freelancers
When it comes to theft, cybercriminals usually use malware: ransomware, banking Trojans, viruses, and other such means. But sometimes, a good story and some perfectly legal software may be enough
987 articles
When it comes to theft, cybercriminals usually use malware: ransomware, banking Trojans, viruses, and other such means. But sometimes, a good story and some perfectly legal software may be enough
You’ve probably heard it before but we’ll say it once more: Apple does not encrypt the kernel starting from iOS 10. Well, OK, the kernel is not encrypted, so what?
In 2010 owners of the largest facial database in the world — Facebook — learned how to distinguish a portrait from a landscape: the social network searched for faces in
What do you do when your e-mail filters fail and you get a bunch of spam letters? Most probably, you delete, delete, delete without even opening them. Of course, that’s
Last week, we talked about desktop ransomware, which is certainly nasty stuff. Ransomware is found not only on desktops, but also on mobile devices — and it is also on
At work or back home — and even on vacation — we are always at risk. Cybercriminals have various ways to reach us wherever we are. For example, they can
The surest way to prevent your webcam from transmitting images or video is to cover its lens. Lots of security-minded folks do just that, having read scary stories about malware
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges?
Lately, millions of PCs all over the world have been regularly displaying a Microsoft notification reading, in essence: “Dear users, how about if you upgrade to Windows 10?” Sometimes, the
Almost every cyberattack has the same goal — stealing someone’s money. However, as a vast variety of equipment is getting connected, a buggy device can lead to more serious consequences
We truly hope that you keep in mind the risks of public charging spots. But what about users who are always on the road or spend a lot of time
Picture this irritating scenario: You are installing an update for Notepad++, Yahoo Messenger, or WinRAR and your antivirus pipes up to warn you the software is malware. You know that
Starting on June 10, many people will be tuning into Euro 2016 football championship and trying to consume as much info as they can. Much like many other large sporting
Everyone likes Twitter. Well, okay, maybe not everyone, but at least 310 million users visit the microblogging platform monthly. And now these 310 million have to consider changing their Twitter
Like the invention of the fire pit, the history of the first password is lost to the depths of time. We know that Romans used them. Shakespeare mentioned passwords in
Having a separate PC for each member of the family is no longer a luxury. Grandma wants to check on how her Facebook friends are doing, Mom needs to shop
Analysts and researchers agree that 2016 is the year when ransomware went really big. Cybercrooks didn’t need much time to see the potential value of cryptolockers, and they readily added
Long before the invention of computers, the first seafarers — Vikings and Polynesians — explored the world and made many discoveries. How did they find their way in the ocean?
Chances are that if you used Myspace or Tumblr, you may be in for something of a headache. You see, it’s been reported that both social networks have had troves
Would you say you love your smartphone? Nothing unusual about that — I’m sure many people would say the same. Sometimes we hate our smartphones, too; every good relationship has
As if ransomware weren’t bad enough, now it’s metastasizing: not just spreading rapidly but even picking up secondary characteristics. Take Cerber, ransomware first spotted in the wild back in February