Always update Safari on your iPhone
If you use an iPhone, it’s crucial to always install the Safari and WebKit updates, even if your browser of choice is Chrome, Firefox or something else. Here’s why.
70 articles
If you use an iPhone, it’s crucial to always install the Safari and WebKit updates, even if your browser of choice is Chrome, Firefox or something else. Here’s why.
How to update Google Chrome right when you really need to, and what to do if you run into problems.
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.
At RSA Conference 2021, researchers talked about how they managed to turn a Comcast Xfinity remote into a listening device.
We use raccoons to explain how identification, authorization, and authentication differ, and why 2FA is necessary.
A lightbulb is all the specialist equipment Lamphone needed to eavesdrop on a conversation in a soundproofed room.
With deepfakes becoming more and more common — and more and more convincing — how can you protect your business?
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
Six severe vulnerabilities in iMessage that allow remote code execution and data stealing with no user interaction? Sounds like a good reason to update to iOS 12.4 as soon as possible.
It seems the only reason to buy a “smart” padlock is to make lock-pickers happy.
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.
Researchers at RSAC 2019 reported on the current vulnerability landscape and built a model that helps with effective patching strategy.
Changing passwords regularly is outdated. Use strong and unique passwords that are easy to remember instead. Here’s how to make them.
Security researchers found several ways to compromise hardware cryptocurrency wallets made by Ledger and Trezor.
The personal data of 257,000 Facebook users, including private messages belonging to 81,000 of them, has leaked online. Hackers claim to have access to 120 million accounts.
Why SMS isn’t the best choice for two-factor authentication, and what alternative types of 2FA you should consider.
Android lets you configure app permissions to protect your data and restrict access to dangerous functions. We explain how to do it and why.
Which is older, the phone or the fax? Is it true that no one faxes anymore? And can a fax machine be hacked? (Spoiler: yes)
Due to certification centers specifics, it is not rare for other people to hold a valid HTTPS certificate for your domain. What can go wrong?
How a seemingly harmless Android application can infect your smartphone using shared external storage.