It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?
On this podcast, Dave and Jeff look at the repercussions of TikTok being banned in India, an encrypted crime network being cracked, Evil Corp, and more.
We developed a sandbox capable of emulating a company-specific system in an isolated environment.
How to protect accounts on Steam, Origin, Epic Store, and other such services.
Common cybercriminal tricks for hijacking Office 365 accounts.
On this podcast, Dave and Jeff look at why Israel is using fish to fight hackers, why Google will pay for you to read news and how Facebook helped the FBI hack Tails OS.
An integrated approach arms even small companies with automated tools that repel complex attacks.
A few stories about how easy it is to accidentally leak sensitive information into the public domain.
At WWDC 2020, Apple rolled out App Clips for iOS. We explain what that — as well as Android Instant Apps — is.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Our experts uncovered a scheme to extract cardholder data using Google tools.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
To protect ADAS from external interference, cars need a special approach to cybersecurity.
Common attack schemes targeting SMB employees.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
Is your Wi-Fi a bit wobbly? Here are some easy tips to overcome the problem.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
Tools and approaches to help you get some online privacy.
Age-based gaming ratings serve as a warning that the contents of the game may be unsuitable to children. We will review different rating systems used to label console and PC games.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
Flightradar24 allows you to track what’s happening to any particular aircraft taking a family member or friend to their destination. Let’s find out how this service works.
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
How to protect your Instagram account and personal photos from prying eyes.
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
No PIN on your phone? Pickpockets will thank you for that.