
Selling cryptocastles in the sky
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.
60 articles
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.
Many people assume that an HTTPS connection means that the site is secure. In fact, HTTPS is increasingly being used by malicious sites, especially phishing ones.
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
Facebook sends so many notifications that sometimes it’s tempting just to turn them off. We tell you how to do it — or how to adjust them so they don’t take over your life.
Some habits, at first glance, seem to have nothing at all to do with security. However, looks can be deceiving.
Our research shows most users of online dating sites fudge information about themselves. Why they do it and what you can do about it.
What if you could pay with your personal data for goods – as if it was some sort of currency? Sounds attractive… or scary?
Fraudsters make a fortune mining cryptocurrencies — on your computer, at your expense, and without your knowledge.
For a great majority of parents, it’s quite reasonable to worry that kids will come across inappropriate websites — or worse — while they’re playing or browsing on an iPhone
It’s true not much malware exists in the wild for MacOS or iOS. But there is some — and phishing sites, spammers, and carders don’t discriminate on the basis of
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include
Black Friday and Cyber Monday, followed by the Christmas sales are high season for cybercriminals: as you’re trying to get that shiny new TV or pair of jeans for the
Perhaps the most striking point about last week’s huge DDoS attack, which took down more than 80 big websites and online services, is that the criminals behind the attack accomplished
In the beginning, the Internet was not terrifically user friendly — early users needed tech chops just to get online, and they had to do so over a wired, dial-up
At work or back home — and even on vacation — we are always at risk. Cybercriminals have various ways to reach us wherever we are. For example, they can
Almost every cyberattack has the same goal — stealing someone’s money. However, as a vast variety of equipment is getting connected, a buggy device can lead to more serious consequences
Social networks, online news outlets, media service providers, online shops — all of them offer high quality content, compared to the Internet of the past. To get to this quality,
They say that Internet unites people, which is difficult to argue. Users of the World Wide Web can call their relatives in Europe, find a groupmate from another state in
In what will be our final chapter of our ‘Introduction to VPN’ course, I will tell you something beyond the usual tech jabber on VPN. I’ll cover some technical and
The biggest data breach in history happened when Mossack Fonseca papers fell into the hands of German journalists. The leaked a 2.6 terabyte archive that included 11.5 million documents —