All the latest blog posts from the most relevant cyber security companies in the business.

Coming up on the tenth anniversary of Satoshi Nakamoto’s paper, do we really need yet another take on Bitcoin? Well, I think so. Today, I am going to focus on an aspect of this technology that needs more discussion — privacy. The bedrock of blockchain — that every transaction is added into the history and…

Android is a good operating system whose developers truly care about security, but with so many OS versions and applications, keeping an eye on all of them is a tall order. Therefore, new ways to circumvent the built-in security mechanisms surface fairly often. The latest way to hack Android is called “Man-in-the-Disk,” and that is…

Many people think that Android devices do not need an antivirus solution at all, but countless kinds of malware exist for the mobile OS, some on official stores such as Google Play. In other words, antivirus software could actually come in very handy. So, which one should you choose? Which mobile antivirus? Of course, we…

Anyone who doesn’t use, or at least hasn’t heard of, voice assistants belongs to a very exclusive club. For many, it’s easier to ask Google, Alexa, or Siri a question rather than typing in a search query. However, as with any futuristic technology, care is called for when it comes to voice helpers. We’ve already posted…

Modern smartphones have successfully combined the functionality of a phone, camera, music player, public transit pass, and even a wallet for many years now. Naturally, this makes you wonder about the security of the data they store. Let’s figure out how well smartphones protect users’ most valuable information and how their main security mechanism — a…

So, you’ve been working all year long and finally decided to go on a nice vacation, taking a couple of weeks away from home, office, and everything else? That’s great! Of course, you don’t want anything at all to go wrong with your hard-earned break. To avoid disappointments — or worse — down the road,…

Last year we analyzed an incident depicted in Star Wars: Episode IV. However, we got the feeling even back then that the security failures that led to the destruction of the Death Star were only the tip of the iceberg. The Empire’s problems with information systems security are clearly of a more galactic nature. Fortunately, researchers from Lucasfilm…

You know the saying: “If it ain’t broke, don’t fix it.” Cybercriminals seem to have taken that truism to heart, because they continue to reuse the same old scams — and they never fail to find victims. Last summer, social media worldwide were flooded with reposts of fake airline giveaways. We covered it at the time,…

News websites often feature stories about computer errors and vulnerabilities used to perpetrate sophisticated large-scale incidents like last year’s WannaCry and NotPetya attacks. But experts know that most successful hacks and cracks are the result of very basic blunders by system developers or installers. Incorrectly configured systems are everywhere, and only a few hours separate the moment when a…

Long ago, during the Olympic Games, the participating countries halted their wars and put aside their political disputes. Today, the opposite is increasingly likely. The PyeongChang Winter Olympic Games started with a scandal: unknown hackers attacked the servers just before the opening ceremonies and many spectators were unable to attend the ceremonies as they were unable…