Killer messages on Sony PlayStation 4 and how to deal with them
Not everyone knows that Sony PlayStation 4 (PS4) has its own instant…
Mobile beasts and where to find them — part four
Mobile beasts and where to find them — part one: Adware, subscribers,…
How Instagram accounts get hijacked
(Post updated on August 29; Instagram has introduced applying for verification) Instagram…
IoT security leads to legal headaches
The old adage is that there are only two guarantees in life…
A cryptocurrency exchange hack with a North Korean accent
The attack methods serious cybercriminals use are often so sophisticated that even…
MitM and DoS attacks on domains through the use of residual certificates
HTTPS certificates are one of the pillars of Internet security. But it…
Man-in-the-Disk: A new and dangerous way to hack Android
Android is a good operating system whose developers truly care about security,…
8 fun facts about fax. Yes, fax!
1. The fax predates the phone Scottish inventor Alexander Bain patented a…
Mobile beasts and where to find them — part two
In the last installment of this story about mobile miscreants, we discussed…
Momo, the horror from WhatsApp
The Internet has been seized by a new spooky story. A WhatsApp…