
Lottery scams for the digital age
As the saying goes, “The lottery is a tax on people who are bad at math.” That’s because the odds of winning one of those huge advertised jackpots are insanely,
959 articles
As the saying goes, “The lottery is a tax on people who are bad at math.” That’s because the odds of winning one of those huge advertised jackpots are insanely,
You scroll through profiles on a dating site and you see a nice girl who you might like to date. You can send her a message — and she’ll answer
Last year, we joined forces with Dutch law enforcement to launch the NoRansom website, which helps victims of CoinVault ransomware restore access to their data. Later, we enhanced the website
A year ago, a massive breach had a profound impact on the lives of registered users of Ashley Madison, a “dating” site for married people, and nearly killed a thriving
In sports, teams are always looking for ways to get ahead. Players and teams continually, frantically search for new ways to squash their competition en route to claiming another title.
Jornt van der Wiel is a member of our GReAT — Global Research and Analysis Team — and our top ransomware and encryption expert. He lives in the Netherlands, and
Just getting started with your new iOS device? That’s great, and we don’t want to be a buzzkill, but we strongly urge you do devote some time to adjusting the
As the Olympic Games in Rio draw nearer, cybercriminals are preparing more and more traps for sports fans. They make use of all kinds of tactics: phishing letters and fake
As we keep saying, it’s very important to be aware of the latest cybersecurity news and threats. Being prepared is more than half the battle. However, even those who know
The total number of people in the world is believed to be about 7.4 billion. By the end of 2015 Facebook had climbed to 1.59 billion users. With an annual
I remember when Pokémon came out on the Nintendo Gameboy. It was a challenging game that had my friends and me trying to catch all of the monsters. It was
This year, news of ransomware attacks have been coming in like dispatches from a battlefield — nonstop. Every day, researchers find new strains of ransomware and discover new and unconventional
A virus that discreetly infests hardware may be the user’s worst nightmare. Hardware attacks are much scarier than attacks on the operating system because ordinary antivirus scans don’t examine systems
Back in the days of MS-DOS, hackers created malware mainly for entertainment purposes, so there were a lot of bizarre and even funny viruses. For example, one simple piece of
When it comes to theft, cybercriminals usually use malware: ransomware, banking Trojans, viruses, and other such means. But sometimes, a good story and some perfectly legal software may be enough
You’ve probably heard it before but we’ll say it once more: Apple does not encrypt the kernel starting from iOS 10. Well, OK, the kernel is not encrypted, so what?
In 2010 owners of the largest facial database in the world — Facebook — learned how to distinguish a portrait from a landscape: the social network searched for faces in
What do you do when your e-mail filters fail and you get a bunch of spam letters? Most probably, you delete, delete, delete without even opening them. Of course, that’s
Last week, we talked about desktop ransomware, which is certainly nasty stuff. Ransomware is found not only on desktops, but also on mobile devices — and it is also on
At work or back home — and even on vacation — we are always at risk. Cybercriminals have various ways to reach us wherever we are. For example, they can
The surest way to prevent your webcam from transmitting images or video is to cover its lens. Lots of security-minded folks do just that, having read scary stories about malware