ALL POSTS Tech support scammers target smartphone and tablet users Jérôme Segura January 13, 2014 0 Comments The tech support scam (AKA the Microsoft/Windows support technician call), which is essentially about social engineering a mark over the phone… The RTLO method Pieter Arntz January 9, 2014 0 Comments After my post about extensions, I received some requests to deal with another method of pretending to be a different type… Encryption is Loud and the Walls Have Ears Adam Kujawa January 8, 2014 0 Comments Seems like the interest in computer communication via sound is taking another peak in interest now that researchers discovered a way… Hard times on The Moscow Times Jérôme Segura January 7, 2014 0 Comments The Moscow Times, ‘Russia’s only daily newspaper in English’, has been a popular source of information for expatriates since it started… Life is a breach, and then you’re pwned Jean Taggart January 6, 2014 0 Comments The continuous flow of high-profile data breaches are a problem for anyone wishing to stay secure. Every time I hear about… Steer Clear of These “Free £250 ASOS Gift Voucher” Sites Christopher Boyd January 2, 2014 0 Comments What is it? The latest in a run of sites claiming to offer vouchers for well-known brands, this time focusing on… Taken down by the ‘DERP’ Joshua Cannell December 31, 2013 0 Comments An unknown hacker, who goes by the name of ‘DERP’, recent began targeting many popular video-game websites with Distributed Denial of… Give a Doge a Coin Adam Kujawa December 31, 2013 0 Comments Well, it’s happened. The internet is just a few steps away from becoming a sentient being, given life and value by… Vulnerability Found in Samsung’s Galaxy S4 Armando Orozco December 27, 2013 0 Comments Researchers from Ben-Gurion University’s security lab (BGU) discovered a vulnerability in the Samsung Galaxy S4’s Knox architecture. If exploited, the attacker… Previous 1 … 557 558 559 560 561 … 590 Next Contributors Threat Center Podcast Glossary Scams