Case study: fake hardware cryptowallet
Full review of a fake cryptowallet incident. It looks and feels like a Trezor wallet, but puts all your crypto-investments into the hands of criminals.
377 articles
Full review of a fake cryptowallet incident. It looks and feels like a Trezor wallet, but puts all your crypto-investments into the hands of criminals.
Image-generating neural networks are already everywhere. What privacy risks do they pose?
Linux and ESXi-based systems are increasingly falling victim to ransomware attacks. So how can you protect your servers?
Hardware crypto wallets are effective at protecting your cryptocurrency, but they can still be stolen from. Let’s address the risks their owners need to be protected from.
Watch out! Fraudsters posing as FedEx employees and police officers could be scamming you – including via video-link.
How to reliably protect your cryptocurrency given the numerous fraud schemes and lack of protection through government regulation.
Scammers are using social engineering to shake down newly onboarded employees.
We investigate why chip cards are no panacea, and what precautions should be taken when making a payment.
Cybercriminals are distributing a Trojan stealer under the guise of a ChatGPT desktop client for Windows. We delve into the details and ways to protect yourself.
How to know if you’re facing a scam: we identify all the red flags in a recent scam that deployed a fake cryptocurrency exchange
Home video surveillance systems are said to be safe. But are you ready to become a reality TV star without realizing it?
Miners still pose a threat to businesses — especially ones that use cloud infrastructure.
Another modification of WhatsApp has turned out to be malicious. We explain what’s happened and how to stay protected.
Our experts discovered a fresh version of CosmicStrand, a rootkit that hides from researchers in the UEFI firmware.
Our experts studied the shadow market for initial access to corporate infrastructure.
How installing unknown apps works in various versions of Android, and why you shouldn’t do it.
Guard against ransomers who encrypt your files and demand payment for their safe return.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
The most active groups targeting companies, encrypting data, and demanding ransom.