Should we be more concerned about smart city tech?
Imagine someone shut down all of the traffic lights in New York…
Mobile banking Trojans: what they are and how to protect against them
1. Why do I need to read this? This article will help…
Top 7 Biggest data breaches of the 21st century
AdobeDate: October 2013.Leaked: 153 million user records.Details: As reported in early October…
How not to become a part of botnet
You’ve probably heard the word botnet more than once recently, and that’s…
Security Week 36: jailbreak theft, farewell to RC4 and holes in routers
Our lives will be smooth once PCs are embedded into our brains.…
Naked online: cyberthreats facing users of adult websites and applications
Pornography has always been part of human culture, and this continues in…
What world with quantum computers would be like and what it means for you today
Quantum computers are said to be coming quite soon and will change…
Acecard — the most advanced banker attacking thousands of users
It seems that there is now a typical scenario for malware evolution.…
Five weird and funny modern Trojans
Back in the days of MS-DOS, hackers created malware mainly for entertainment…