Using simple tools such as lasers and music to trick voice assistants and motion sensors.
On this podcast, Dave and Jeff discuss the latest scam targeting Travelex customers, a phishing attack on the UN, Australia relief being targeted by Magecart, and more.
Still using Windows 7? Time to go to Windows 10 — or beef up protection.
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
Privacy International talks about period-tracking apps and the perils of sharing secrets with apps.
Setting up your child’s first smartphone right will help keep them safe — and save you money.
Four steps to reduce your company’s IT carbon footprint — and save money.
Under the pretext of compensation for data leaks, fraudsters are selling “temporary U.S. social security numbers.”
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Let’s talk about mobile malware that can empty your bank account or spy on you.
The infamous Lazarus group’s newest campaign is really hard to detect. Bonus: How cryptocurrencies, cybercriminals, and ramen noodles are connected.
Take a stroll through your apps and you’re bound to encounter some unfamiliar names. Where do those unaccounted-for apps on your PC come from, and are they safe?
Researchers try to modify the contents of a signed PDF file without invalidating the signature.
When training staff, it is not enough to give them the right information; they also have to digest it and remember it.
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
Longer product life cycles mean sustainability; shorter ones are easier in terms of support. Which should you choose?
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
Exploring front-running to capture the Gemini dollar’s antispam stake.
One Instagram post with a picture of a ticket can cost you a whole lot of time and money and ruin your day. This is how you can avoid it
Age-based gaming ratings serve as a warning that the contents of the game may be unsuitable to children. We will review different rating systems used to label console and PC games.
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
A guide on how to protect your account against spammers, hackers, and other gate-crashers.
Chrome learns to block ads by itself. What has Google come up with, and how will it help users?
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?
Flightradar24 allows you to track what’s happening to any particular aircraft taking a family member or friend to their destination. Let’s find out how this service works.
How to protect your Instagram account and personal photos from prying eyes.
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
Facebook sends so many notifications that sometimes it’s tempting just to turn them off. We tell you how to do it — or how to adjust them so they don’t take over your life.
It can be tempting to disregard software update notifications. Everything seems to be working fine. Sometimes programs behave oddly or crash after an update. And by the way, you have