testing post title - If this is to be a featured post, please add a short description, around 120 characters long. If a feature description is not included, the post’s excerpt will be used. If this is to be a featured post, please add a short description, around 120 characters long. If a feature description is not included, the...
Parental monitoring apps: How do they differ from stalkerware? - What are the differences between stalkerware apps and parental monitoring apps? What is an “acceptable” or “safe” parental monitoring app? And how can a parent know whether they’re downloading a “legitimate” parental monitoring app or instead a stalkerware app merely disguised as a tool for parents?
No man’s land: How a Magecart group is running a web skimming operation from a war zone - We take a look into a Magecart group's web skimming activities, which are relying on a bulletproof-friendly host in battle-scarred Luhansk, Ukraine to provide cover for their activities, safe from the reach of law enforcement and the security community.
Compromising vital infrastructure: problems in education security continue - While educational organizations lack funding they are high on the target lists of cybercriminals. Does one fact lead to another?
Hi, honey. It’s mom. My phone is acting funny again. - Often, older generations must turn to their progenitors for help with technology. What are their frustrations and concerns, and how can younger generations better help?
Meet Extenbro, a new DNS-changer Trojan protecting adware - We found a new Trojan that uses aggressive techniques, including blocking access to security sites, to deliver an adware bundler. Read up on what Extenbro can do and how to get this pest off your system.
A week in security (July 8 – 14) - A roundup of cybersecurity news from July 8–14, including secure data sending, federal data privacy law, the Soft Cell attack, and more.
Cellular networks under fire from Soft Cell attacks - We break down the recently revealed attacks on telco operators around the globe, targeting specific high-value individuals.
Caution: Misuse of security tools can turn against you - If not implemented correctly, the very security tools we use to keep our information private may actually cause data leaks themselves. We outline a few cases and provide suggestions for researchers and security admins.

Select your language