The perils of short links
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
377 articles
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?
What caused a mass vulnerability in VPN clients, and how to keep them working.
How cybercriminals force victims to work for them with offers of easy money.
Four threats you might face when using Airbnb, and tips for avoiding them.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Beware! Scammers are targeting your WhatsApp. Here’s how to spot and avoid fake WhatsApp calls.
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
What web skimmers are, why you should keep a look out for them when shopping online, and how to protect yourself.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.
Now anyone can sign device firmware with MSI private keys. This represents a long-term persistent risk to be considered by all users.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
The effectiveness of a sandbox largely depends on its ability to realistically imitate a working environment.
Сloud technologies differ in terms of both costs and risks. What cloud type should you choose, and how should you begin your migration?
It’s obvious already that AI needs regulating, but how? Here’s Eugene Kaspersky telling us how he sees it.