Apple CPU encryption hack
We review a recent research paper highlighting a major hardware vulnerability in Apple M1, M2, and M3 CPUs.
We review a recent research paper highlighting a major hardware vulnerability in Apple M1, M2, and M3 CPUs.
Got a message from your boss or coworker asking you to “fix a problem” in an unexpected way? Beware of scammers! How to protect yourself and your company against a potential attack.
A recent study shows how it’s possible to identify typed text from the sound of keystrokes — even in far-from-ideal environments.
In 2023, our products and solutions took part in precisely 100 independent studies — winning 93 times: our best year ever.
To go undetected, attackers can operate in your network without any malware at all. How to detect them and prevent damage?
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.
What’s the easiest way to hack a WPA2-protected wireless network? Using PMKID interception. Here’s how it works, and what you can do to protect yourself.
Researchers claim to have found a way to recover a fingerprint by… eavesdropping on a user swiping a finger across the screen!
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.
Cybersecurity trends to consider and new threats to protect against in 2024.
Four handy ways to lock your screen on Windows and macOS.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?