Security Week 36: jailbreak theft, farewell to RC4 and holes in routers
Our lives will be smooth once PCs are embedded into our brains.…
How three criminal groups — Metel, GCMAN and Carbanak 2.0 — stole millions dollars from dozens of banks
In 2015 we saw the rise of cybercriminals who rob banks directly.…
Kamluk on Adwind RAT
Mike Mimoso of Threatpost sat down with Vitaly Kamluk of our Global…
Mischa: a friend for Petya and yet more ransomware for the rest of the world
[Updated on June 28, 2017] Petya and Mischa are friends. They usually…
DressCode Android Trojan in official Google Play store
We often advise Android users to download apps from official app stores…
Mobile banking Trojans: what they are and how to protect against them
1. Why do I need to read this? This article will help…
How activation works in Windows 10: Digital license vs. product key
Over the years, the installation of Windows has gotten easier and more…
Hot CES Tech Needing Security
So the whirlwind that is CES is in full swing. Companies of…
How to unlock a .crypt file
The common user experience when it comes to ransomware looks like this:…
Invisible Skimmers at the ATMs
If you are aware of what ATM skimmers are — and in…