Invisible skimmers at the ATMs
Criminals behind the ATM Infector campaign are turning ATMs into invisible skimmers.
69 articles
Criminals behind the ATM Infector campaign are turning ATMs into invisible skimmers.
hackers are eager to make their buck before every merchant in US moves to chip-and-ping cards
Big data is amazing for sure, but as any other tech, especially emerging one, it has issues. Let’s take a look what could possibly go wrong with big data implementations.
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
What’s wrong with ATMs’ security and what should the banks and manufacturers do about it.
At SAS 2016 our GReAT experts talk about a Java-based multi platform malware used by hundreds of cybercriminals for a handful of purposes
At the Chaos Communication Congress a university professor tells how to forge keys using a 3D printer and we come up with a few tips how to protect yourself from that.
At the Chaos Communications Congress, researchers explain how Dieselgate happened
The modern rail system is basically a network of hundreds of different, but interconnected computers. Are these systems flawless security-wise?
Did you know that your PC can become infected by an email that you never actually read?
Yesterday The European Court of Justice ruled that the Safe Harbor agreement is invalid: what does this decision mean for your personal data?
Kaspersky Lab’s researchers have found that Russian-speaking Turla APT group is exploiting satellites to mask its operation ant to hide command-and-control servers
Since there’s nothing unhackable in this world, why should chemical plants should be the exception?
Predictability of human beings can barely be overestimated when it comes to passwords. But what about lock screen patterns, are we predictable as well when we’re creating them?
Speaking about legal side of the question, it’s very easy to kill a human: all you need is common sense and a computer with Internet access
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
The TeslaCrypt ransomware family is notable for targeting games-related files, as well as the usual documents, pictures and so on. In the new version it became even more dangerous
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference. Let’s take a look at the new security features.
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
I gather our readers have already heard about some controversial Google Glass experiences. Now, it is time to discuss the response by Microsoft, HoloLens augmented reality system.
Kaspersky Lab and the Dutch cyber-police created a tool that restores files encrypted by CoinVault ransomware.