
Fact or Fiction? Reversing your PIN can call the police in an emergency
Today, we will continue on with our mythbusting Fact or Fiction series with a tale surrounding a unique feature believed to be tied to ATM machines around the world. “If
565 articles
Today, we will continue on with our mythbusting Fact or Fiction series with a tale surrounding a unique feature believed to be tied to ATM machines around the world. “If
If you sit and think about it for a second, online phishing is not that far from actual fishing. The one major difference is that the online fishermen are criminals.
So your hotel stay has come to an end and its time for checkout. When it comes to the Internet, there are two schools of thought when it comes to
Every time there is a plane crash, there is typically a lot of publicity. Without doubt, armchair pilots and safety experts come out of the woodwork. Every last one of
Checking in to an airport to brag that you are on your way to a Parisian getaway is so yesterday. For starters Swarm has lost it’s luster and usage since
A year ago our colleague David Jacoby, a researcher at GReAT, successfully attempted to hack his own home and discovered a lot of curious things. David’s experiment inspired many Kaspersky
While communication technology providers are seeking consensus over the future of 5G networks, carriers are wasting no time in rolling out new technologies available for the current 4G networks. Voice
Nearly everyone has faced a cyber criminal’s activity at one point or another. You have probably received a magical SMS that read something like: “You are the winner!!! Your Ferrari
In case you haven’t noticed, Facebook has been rolling out a more robust search functionality. The service, launched last week, is called Search FYI. Tom Stocky, Facebook’s VP of Search,
The old saying goes that “the walls have ears,” something similar can be said about computers. It seems like every day brings another data breach, malware or phishing attack –
British scientists proved that Android devices are highly dangerous when it comes to you and your data. It’s no joke — researchers at the University of Cambridge did serious research
When find yourself caught in the eye of the storm, you might have problems understanding what has really happened. While stuck in a traffic jam, you would never know it
Are you growing concerned about where exactly your children hang around after school? Or how much time they spend on their mobile phones? Or are you worried who they message
What if you could be sure that your kids use Internet safely while their smartphones are protected from fraud, unwanted calls and SMS? Moreover, what if you could find your
As proven by Ed Snowden and Co., utopias are a myth. The anti-utopian storylines have been ingrained in our everyday lives. Technological progress brings a lot of magnificent things like
I wonder what will happen when there are no more infosec problems. Will our Threatpost.com news blog convert to a digest of kitty cats? Is this bright future feasible at
We are still in the midst of the smartphone boom. Over the past couple of years, over 50% of all mobile devices used by consumers are smartphones. In turn, this
I would like to start this week’s new edition of Security Week with news that has nothing to do with information security. Volkswagen diesel vehicles happened to be emitting far
A worm was found in the safe garden of Apple. About 40 iOS apps are now being cleaned out of the App Store because they turned out to be infected
Do you consider yourself cyber-literate? Have you been so immersed in the online life so you can tell what’s real and what’s fake? We recently decided to test our reader’
In fact, it’s the one of the most widely believed myths in the infosec world. At the same time, it’s the most non-standard one. That double-sided nature is likely the