All data has been stolen. What’s next?
Cybercriminals are starting to shift their focus from stealing personal data to…
The hidden threats of router malware
You check your computer for viruses every week, update systems and programs…
Triada: truly scary malware for Android
You know how armies typically move: first come the scouts to make…
Security Week 36: jailbreak theft, farewell to RC4 and holes in routers
Our lives will be smooth once PCs are embedded into our brains.…
What are IoT search engines Shodan and Censys and what are they capable of
Look around — we are living in the Internet of Things. In…
A Pokémon Go Trojan in Google Play
Less than three months after Pokémon Go launched, criminals sneaked malware into…
Fantom ransomware poses as Windows Update
We frequently advise you to update your operating system and software on…
Top 5 most notorious cyberattacks
Most cyberattacks are fairly mundane. In the worst cases, the user sees…
Another WordPress plugin under attack, and media blame disgruntled researcher
Рекомендуем почитать: Xakep #280. Джейл-2022 Содержание выпуска Подписка на «Хакер»-60% Волна атак…
How to unlock a .crypt file
The common user experience when it comes to ransomware looks like this:…