A renovated version of TeslaCrypt ransomware has recently affected numerous devices in Japan and Nordic countries.
People encrypt their communications so strongly that governments cannot access it when there is a need. Is it really bad?
Think a photo of your boarding pass is innocent when posted online? Think again.
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
Vitaly Kamluk answers our readers’ questions about his work with INTERPOL and other digital investigations.
To hackers’ delight, merchant vessels that transfer about ninety percent of the world's cargo heavily depend on automation and remote monitoring systems with poor IT security.
The Carbanak APT group managed to steal a total of $1 bln from dozens of banks worldwide
Banks continue to lose a lot of money because of carders and seek ways to ensure their customers are safe. Let’s take a look at the latest methods of bank card protection and how ...
In part one of our series, we discussed tech used by bank card ‘seekers’. Today, we’ll cover how criminals carry out the most dangerous skimming processes.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.