
57 shady Chrome extensions clock up six million installs
Researchers find 57 potentially dangerous browser extensions in the Chrome Web Store. Here’s why they’re dangerous, and how not to fall victim.
678 articles
Researchers find 57 potentially dangerous browser extensions in the Chrome Web Store. Here’s why they’re dangerous, and how not to fall victim.
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
Newly discovered vulnerabilities in AirPlay allow attacks on Apple devices and other AirPlay-enabled products over Wi-Fi – including zero-click exploits.
We explore how cybercriminals are targeting IT specialists searching for a popular network scanner, using the Interlock ransomware attack as an example.
A look at how Apple’s new child protection features work, what their limitations are, and why you still can’t do without third-party solutions.
Scammers are exploiting Google services to send fake law enforcement inquiry notifications, making them look like they originate from accounts.google.com.
This is your World Password Day reminder about how to create strong passwords and remember them.
Popular AI code assistants try to call non-existent libraries. But what happens if attackers actually create them?
We explain where and how to view porn without risking the security of your devices or your wallet.
A security researcher has investigated his own smart mattress cover, discovering several ways to hack it — including through a backdoor preinstalled by the developer.
We found several groups of sites mimicking official websites of the DeepSeek and Grok chatbots. Fake sites distribute malware under the guise of non-existent chatbot clients for Windows.
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
A year after the ransomware attack on healthcare giant UnitedHealth Group, we’ve compiled all publicly available information about the incident and its aftermath.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.
Banshee stealer, a macOS stealer that emerged last year, is now roaming free on the Web, infecting Mac users and gaining new capabilities. How to protect yourself?
Scareware is malware that scares users into doing something risky. Here’s how it works.
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
Scammers posing as buyers snatch one-time codes during online product demos.
We’ve updated the design of our password manager’s mobile version. Storing and managing passwords is now even more convenient.
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.