Global police shut down VPN service favored by cybercriminals
A global operation takes down the infrastructure of DoubleVPN and seizes data about its customers
A global operation takes down the infrastructure of DoubleVPN and seizes data about its customers
Are you on Facebook? So are scammers. Here are some of the most common con jobs on Facebook you should watch out for and how you can tell if you’re being scammed.
Information scraped from LinkedIn user profiles includes full names, gender, email addresses and phone numbers
What was it like to work for, and be friends with, the technology entrepreneur back when he helped shape the computer security industry?
Cyberattacks targeting the gaming industry skyrocket, with web attacks more than tripling year-on-year in 2020
Brave's search engine takes on Google, promising to let users surf the web without leaving a trace
It can be difficult to tell a legitimate website apart from an unsafe one – follow these steps to identify and protect yourself from bad websites
What does the increasingly fuzzy line between traditional cybercrime and attacks attributed to state-backed groups mean for the future of the threat landscape?
By failing to prepare you are preparing to fail – here’s what you can do today to minimize the impact of a potential ransomware attack in the future
Most medical and fitness apps in Google Play have tracking capabilities enabled and their data collection practices aren’t transparent
OSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers
The fraudsters ran their campaigns from the cloud and used phishing attacks and email forwarding rules to steal financial information
How do vishing scams work, how do they impact businesses and individuals, and how can you protect yourself, your family and your business?
Should we expect cybercriminals to ditch the pseudonymous cryptocurrency for other forms of payment that may be better at throwing law enforcement off the scent?
The latest Chrome update patches a bumper crop of security flaws across the browser’s desktop versions
ESET researchers discover a new campaign that evolved from the Quarian backdoor
ESET researchers shed light on new campaigns from the quiet Gelsemium group
Law enforcement around the world used a messaging app called AN0M to monitor the communications of alleged criminals
Hacking an orbiting satellite is not light years away – here’s how things can go wrong in outer space
Websites using Fancy Product Designer are susceptible to remote code execution attacks even if the plugin is deactivated