Coinhive cryptocurrency miner to call it a day next week
The service became notorious for its use by ne’er-do-wells looking to make a quick buck by hijacking the processing power of victim machines to generate virtual money
The service became notorious for its use by ne’er-do-wells looking to make a quick buck by hijacking the processing power of victim machines to generate virtual money
Worse, attackers have already been spotted targeting the flaw to deliver cryptocurrency miners and other payloads
Following the revelation that a list containing millions of stolen usernames and passwords had appeared online, we tell you a few different ways to find out if your credentials were stolen in that—or any other—security breach
With FIDO2 certification for Android, Google is setting the stage for password-less app and website sign-ins on a billion devices
The keeper of the internet’s ‘phone book’ is urging a speedy adoption of security-enhancing DNS specifications
A new report shines some light on multiple aspects of the growing threat of cyber-extortion
As the use of this technology grows so does the risk that attackers may hijack it
And that’s on top of the heartache experienced by the tens of thousands of people who fall for romance scams each year
Siegeware is what you get when cybercriminals mix the concept of ransomware with building automation systems: abuse of equipment control software to threaten access to physical facilities
Anybody with hacking prowess can take a crack at reading votes or even rigging the vote count itself
Recent news articles show that MSPs are now being targeted by criminals, and for a variety of nefarious reasons. Why is this happening, and what should MSPs do about it?
Apps downloaded from Google Play were eight times less likely to compromise a device than apps from other sources
A closer look at the damage caused by smoke particles and some steps you can take to aid recovery
Bank of Valetta, which went dark for a day after the fraudulent transfers of €13 million, is now looking to get the money back
An interview with ESET malware researcher Lukáš Štefanko about Android banking malware, the topic of his latest white paper
Instead of financial gain or other, more usual, goals, the attacker leaves ‘scorched digital earth’ behind
Roses are red, violets are blue, watch out for these scams or it may happen to you
Innocently providing your name at your local coffee shop is just an example of how easy it can be for miscreants to cut through the ‘privacy’ of social media accounts
The decision to award the bug has been welcomed but one security researcher has said that they need to do more to compensate those who find bugs
Cryptocurrency stealers that replace a wallet address in the clipboard are no longer limited to Windows or shady Android app stores