Phone scams and cutting-edge technology for speech synthesis
Readers of this blog will already be familiar with phone scams —…
Naked online: cyberthreats facing users of adult websites and applications
Pornography has always been part of human culture, and this continues in…
Top 5 most notorious cyberattacks
Most cyberattacks are fairly mundane. In the worst cases, the user sees…
How three criminal groups — Metel, GCMAN and Carbanak 2.0 — stole millions dollars from dozens of banks
In 2015 we saw the rise of cybercriminals who rob banks directly.…
Kamluk on Adwind RAT
Mike Mimoso of Threatpost sat down with Vitaly Kamluk of our Global…
TeslaDecryptor decrypts all files damaged with TeslaCrypt
According to the theory of probability, strange things have to happen every…
Don’t use USB sticks you find
Here is a scenario for you: You are walking around, catching Pokémon,…
How not to become a part of botnet
You’ve probably heard the word botnet more than once recently, and that’s…
Hot CES Tech Needing Security
So the whirlwind that is CES is in full swing. Companies of…
How to unlock a .crypt file
The common user experience when it comes to ransomware looks like this:…