Would you plug in a USB that you got in the mail?
I am not sure about you, but [sarcasm on] my ABSOLUTE FAVORITE THING is opening my mailbox to find unsolicited mail. You know, junk mail [sarcasm off]. Raise your hand
1401 articles
I am not sure about you, but [sarcasm on] my ABSOLUTE FAVORITE THING is opening my mailbox to find unsolicited mail. You know, junk mail [sarcasm off]. Raise your hand
Yahoo is expected to announce a “massive” data breach ahead of its impending sale to Verizon. Although the news is not yet confirmed at the time of this posting (several
Today Google releases the Allo app — a new messaging app that was expected to provide a few cool features as well as privacy for its users. But the company
Researchers at Chinese security company Keen Lab claim that they have managed to remotely hack an unmodified Tesla Model S with the latest firmware installed. After one driver’s interaction with
Security solutions must be able to perform two big functions: prevention and, if necessary, remediation. Kaspersky Lab’s latest patent is a technology that makes both more effective. The most common
In the beginning of 2012, I got a MacBook. At the time, I knew little about gadgets, and I was not planning to buy any other Apple devices. I powered
Less than three months after Pokémon Go launched, criminals sneaked malware into Google Play to target Pokémon trainers. Our experts discovered the Trojan several days ago and immediately reported it
The cybersecurity industry has a fundamental insecurity: talent supply. Frost & Sullivan estimates that by the year 2020 the field of cybersecurity will see a talent shortage of 1.5 million
Bitcoin, and its fundamental technology blockchain, have been popping up in the news plenty over the past few years. However, discussion about them is typically a bit high level —
We are pretty sure you have a smartphone. Right now, while you are reading this article, it’s on your table, or in your pocket, or, maybe, in your hand. You
For centuries, advertising was fundamentally unidirectional. A company blasted out advertising and the public — actually, not a very predictable portion of the public — received it. That’s still the
The very word automobile means self-moving. Through their history of more than a century, automobiles have evolved, increasingly taking over the driving process from humans. Many years ago, the car
We frequently advise you to update your operating system and software on a regular basis: Vulnerabilities, unless patched in time, can be exploited by malware. Well, a curious piece of
Earlier this week, my colleague Chris from Threatpost penned an article about how Dropbox forced a password reset for users who had not changed their passwords since 2012. At the
Perhaps the biggest problem with cybercriminals is that they are extremely difficult to catch. Think of a real-life bank robbery with guns and face-masks — the thieves leave fingerprints; their
When Facebook bought WhatsApp for a whopping $19 billion, there was no doubt that sooner or later the social media giant would try to recoup its money and turn WhatsApp
Security experts and media pundits warn people to avoid posting pictures of their tickets online. Many people follow this rule, but not everyone. Time and time again and again, and
It’s no secret: ransomware is a painful threat. And it’s not going to disappear anytime soon — with a few exceptions, of course. Good news: This is the story of
About a year ago I implanted a biochip in my hand, embarking on a broad experimental journey. My aim is to understand how the connected humans of the future will
You can change your name or use a pseudonym. You can also edit or delete your social media accounts. But you cannot change your face so easily. Facial recognition helps
As you probably know, modern apps often spy on users — at least to the extent of tracking their locations. If your privacy matters to you and you use an