
AceDeciever: the malware that can infect ANY iPhone
Apple iPhone users usually consider their phones as impregnable fortresses that Apple has built for them: iPhones are often said to be secure and safe, especially when compared to Android
3358 articles
Apple iPhone users usually consider their phones as impregnable fortresses that Apple has built for them: iPhones are often said to be secure and safe, especially when compared to Android
Stop me if you have heard this before: “I am an awesome multi-tasker. I can chat, listen to the speaker and even take notes at the same time!” Chances are you
It looks like 2016 should be declared a year of ransomware, as new families and new versions are popping up every now and then like mushrooms after the rain. Ransomware
Modern men and women can hardly imagine themselves without their mobile devices, similarly experienced Internet users won’t surf web without an ad blocker. Their popularity has risen fast: as early
In the past few years there have been a lot of discussions surrounding big data. These talks generally centered on the amazing opportunities that the technology provides. The byproduct of
We all know that our opinions on what to expose and what to conceive has changed over time. Consequently, people used specific methods to convey something private so it is
Doctors and patients across the world, beware: cyberciminals have a new member of the family! Despite its young age, a one-month-old ransomware has already encrypted files in two American hospitals
As you might have noticed, a security browser extension called Kaspersky Protection is installed simultaneously with our security solutions. In this post we will explain what it does and how
In one of the previous installments of our GSM saga we mentioned an urban legend of hijacking encryption keys on the fly. It presupposes someone can clone your SIM card
We’ve all seen age-based rating labels displayed prominently before the TV shows or featured on website headings, print media title pages, or theater posters. Did you know that these labels
When I was in middle school a friend of mine got a computer, soon after that he got this cool program called AOL and it instantly made his house the
A few months ago, we were approached by the Dutch TV show Opgelicht?!, which discusses various types of fraud. One of the subjects discussed was the “We-Cycle” phishing campaign where
If your device slows down or hangs up, you are not alone. Sometimes apps refuse to open or a browser will fail to respond at a crucial time. When irritated
Similar to other successful business sharks, cybercriminals are in constant search of new markets. They carry out experiments, change target audiences and provide feedback to the victims — all to
When a product is built, the manufacturer typically has a lifecycle in mind in regards to how long a consumer will ideally use the device. For example smartphones are something
Recently engineers who have been working to improve legacy cellular technologies, were stricken with a thought: “Why would one need a SIM card, if it’s nothing more than a protected data
Hackers are attracted by any web-resource where large amounts of money changes hands, like moths to light. This is what happened with Steam and, according to Valve’s own calculations, 77,000
Since last year, there is no doubt that it’s possible to take control over a connected car remotely. Despite this, we can see zero uncontrolled cars on the streets that
This report serves as an industry benchmark to help businesses
understand the type and level of IT security threats they face.
Two-factor authentication with SMS is widely used by banking institutions. Of course, this measure works better than a mere password but it’s not unbreakable. Security specialists found out how it
In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages