The out-of-band update fixes a remote code execution flaw affecting the Windows Print Spooler service
Caught between a rock and a hard place, many ransomware victims cave in to extortion demands. Here’s what might change the calculus.
ESET Research uncovers an active malicious campaign that uses new versions of old malware, Bandook, to spy on its victims
As news breaks about the supply-chain ransomware attack against Kaseya's IT management software, here’s what we know so far
Remembering John McAfee, an antivirus software pioneer – Beware these Facebook scams – Data for almost all LinkedIn users scraped and up for sale
You can now secure your account with a physical security key as your sole 2FA method, without any additional 2FA option
A global operation takes down the infrastructure of DoubleVPN and seizes data about its customers
Are you on Facebook? So are scammers. Here are some of the most common con jobs on Facebook you should watch out for and how you can tell if you’re being scammed.
Information scraped from LinkedIn user profiles includes full names, gender, email addresses and phone numbers
What was it like to work for, and be friends with, the technology entrepreneur back when he helped shape the computer security industry?
Telling state-backed hackers apart from cybercriminals – How to check if a website is safe – Gaming firms plagued by cyberattacks amid the pandemic
Cyberattacks targeting the gaming industry skyrocket, with web attacks more than tripling year-on-year in 2020
Brave's search engine takes on Google, promising to let users surf the web without leaving a trace
It can be difficult to tell a legitimate website apart from an unsafe one – follow these steps to identify and protect yourself from bad websites
What does the increasingly fuzzy line between traditional cybercrime and attacks attributed to state-backed groups mean for the future of the threat landscape?
5 steps to take to minimize damage from a ransomware attack – The double-edged sword of OSINT – Watch out for vishing scams
By failing to prepare you are preparing to fail – here’s what you can do today to minimize the impact of a potential ransomware attack in the future
Most medical and fitness apps in Google Play have tracking capabilities enabled and their data collection practices aren’t transparent
OSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers
The fraudsters ran their campaigns from the cloud and used phishing attacks and email forwarding rules to steal financial information