Fantom ransomware poses as Windows Update
We frequently advise you to update your operating system and software on a regular basis: Vulnerabilities, unless patched in time, can be exploited by malware. Well, a curious piece of
1410 articles
			
		We frequently advise you to update your operating system and software on a regular basis: Vulnerabilities, unless patched in time, can be exploited by malware. Well, a curious piece of
			
		Earlier this week, my colleague Chris from Threatpost penned an article about how Dropbox forced a password reset for users who had not changed their passwords since 2012. At the
			
		Perhaps the biggest problem with cybercriminals is that they are extremely difficult to catch. Think of a real-life bank robbery with guns and face-masks — the thieves leave fingerprints; their
			
		When Facebook bought WhatsApp for a whopping $19 billion, there was no doubt that sooner or later the social media giant would try to recoup its money and turn WhatsApp
			
		Security experts and media pundits warn people to avoid posting pictures of their tickets online. Many people follow this rule, but not everyone. Time and time again and again, and
			
		It’s no secret: ransomware is a painful threat. And it’s not going to disappear anytime soon — with a few exceptions, of course. Good news: This is the story of
			
		About a year ago I implanted a biochip in my hand, embarking on a broad experimental journey. My aim is to understand how the connected humans of the future will
			
		You can change your name or use a pseudonym. You can also edit or delete your social media accounts. But you cannot change your face so easily. Facial recognition helps
			
		As you probably know, modern apps often spy on users — at least to the extent of tracking their locations. If your privacy matters to you and you use an
			
		Facial recognition technology is a powerful tool that can be used for good or evil. In this post, we present 10 positive aims fulfilled with the help of this technology.
			
		The banking industry spends a lot of effort, time, and money to protect bank cards. For years, their protection consisted of embossed digits and a signature field, but now smart
			
		Sometimes car security experts specialize, focusing on one vehicle brand or model. For example, Charlie Miller and Chris Valasek spent two years investigating Fiat Chrysler’s Jeep Cherokee. Their choice was
			
		Now that even coffee machines are Wi-Fi connected, getting to smart sex toys was only a matter of time. People actually started thinking along those lines quite a while ago:
			
		On August 9, 2016, LeakedSource revealed that almost 2,000,000 accounts on the official Dota 2 forum were compromised. What does that mean for you? If you are not into Dota
			
		I was one of hundreds of thousands of passengers affected by the recent computer system failure at Delta Air Lines. It happened on August 8, when I had two flights
			
		The “Jeep hackers,” Charlie Miller and Chris Valasek, got their nickname and achieved fame last year when they remotely hijacked a moving Jeep Cherokee. It’s a year later now, and
			
		By now, you are no doubt familiar with short-term rental sites — AirBnB, Homeaway, and the like. Many of you reading this have used them, whether as guest or as
			
		Imagine someone shut down all of the traffic lights in New York City at 4 pm. That idea has been stuck in my head since Ryan Naraine mentioned it at
			
		Here is a scenario for you: You are walking around, catching Pokémon, getting fresh air, people-watching, taking Fido out to do his business, when something catches your eye. It’s a
			
		Tell me what you think of Adobe Flash and I’ll tell you if you work in cybersecurity. To most people, Flash is something that your browser asks you to update
			
		Jornt van der Viel is the top ransomware expert of our GreAT — Global Research and Analysis Team. But he also has deep knowledge when it comes to encryption. We’ve