What is iPhone X Face ID and how secure is it?
How facial recognition works in the new Apple iPhone X — is it secure enough for you to trust?
3477 articles
How facial recognition works in the new Apple iPhone X — is it secure enough for you to trust?
Fraudsters make a fortune mining cryptocurrencies — on your computer, at your expense, and without your knowledge.
Cybersecurity is ever-changing how can executives stay ahead of the curve?
at Asian Manufacturing Awards 2017, held in Singapore, we were recognized as the Best Industrial Cybersecurity Provider.
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
Transatlantic Cable Podcast episode 2: autonomous pizza delivery, Sarahah’s privacy issues, reprieve for victims of Yahoo!’s data breach and more.
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
This week’s Transatlantic Cable podcast features stories on Burger King, scams, Instagram security and more.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
Modern technology actually helps phone scammers — what you need to know to stay safe.
Considering the modern threat landscape, the healthcare industry should pay more attention to cybersecurity
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Everyone talks about the advantages of Bitcoin and blockchain, but we never seem to hear about their disadvantages. Perhaps now is the time.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?
Living online is more comfortable than ever — do you really still need a helmet?
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?
Microsoft changes its approach to cybersecurity solutions in response to partner feedback
Kaspersky Anti-Targeted Attack: 100% threats detected with 0 false positives in ICSA Labs certification test.