What happens to data stolen using phishing?
We follow the trail of a phishing attack to break down, step-by-step, what happens to the data stolen from users.
26 articles
We follow the trail of a phishing attack to break down, step-by-step, what happens to the data stolen from users.
How researchers hacked DeckMate 2 card shufflers, and how the mafia exploited those very vulnerabilities to cheat at poker.
Researchers have discovered how to connect to someone else’s dashcam in a matter of seconds, and weaponize it for future attacks.
You’ve received a threatening email. What’s your next move?
A year after the ransomware attack on healthcare giant UnitedHealth Group, we’ve compiled all publicly available information about the incident and its aftermath.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
Time to update Fortra GoAnywhere MFT: an exploit has been developed for a critical vulnerability that allows attackers to bypass authentication and create admin accounts.
DIY security trainings for your colleagues that are both fun (for you) and educational (for them).
It’s common practice in many companies to keep work and personal information separate. But browser synchronization often remains unnoticed — and attackers are already exploiting it.
Information security measures are far more effective when supported by top management. How to get this support?
Every year, the number of tasks we entrust to machines rises steadily. How safe is this?
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss Olympic phishing, medical records hacked, police giving away infected USB drives and more.
Xiaomi’s robotic vacuum cleaner was hacked by security researchers. However, it proved much more secure than most other smart devices.
This week’s Transatlantic Cable podcast dishes on a hacked plastic surgeon, unsafe dating apps, new forms of 2FA, and more.
Considering the sweeping regulations and laws meant to safeguard children’s privacy in particular, you might think electronic devices and connected toys for kids would be particularly safe and secure. We
One of the most important pieces of advice on cybersecurity is that you should never input logins, passwords, credit card information, and so forth, if you think the page URL
Earlier this week, my colleague Chris from Threatpost penned an article about how Dropbox forced a password reset for users who had not changed their passwords since 2012. At the
Since last year, there is no doubt that it’s possible to take control over a connected car remotely. Despite this, we can see zero uncontrolled cars on the streets that
Welcome to this week’s edition of Security Week. In the maiden installment, we learned of self-unlocking cars, the Android’s chronic Stage Fright and that we won’t be watched in the