FBI warns of romance scams using online daters as money mules

Up to 30 percent of romance fraud victims in 2018 are estimated to have been used as money mules Scammers are using dating sites and apps not only to scout for lovesick men and...

Face scanning – privacy concern or identity protection?

What issues would face scanning attached to a mobile device resolve and, if used correctly, would it make the incursion into my privacy acceptable? On December 1st, China’s regulation requiring people to have...

Stantinko botnet adds cryptomining to its pool of criminal activities

ESET researchers have discovered that the criminals behind the Stantinko botnet are distributing a cryptomining module to the computers they control The operators of the Stantinko botnet have expanded their toolset with a new means...

Notorious spy tool taken down in global operation

IM-RAT, which could be had for as little as US$25, was bought by nearly 15,000 people Law enforcement authorities in a number of countries have broken up a cybercriminal operation that peddled a notorious...

80% of all Android apps encrypt traffic by default

Google keeps pushing in its mission for broader encryption adoption Android commands the lion’s share of the mobile operating system market. And with so many users under its wings, it should come as no...

FBI warns of romance scams using online daters as money mules

Up to 30 percent of romance fraud victims in 2018 are estimated to have been used as money mules Scammers are using dating sites and apps not only to scout for lovesick men and...

Face scanning – privacy concern or identity protection?

What issues would face scanning attached to a mobile device resolve and, if used correctly, would it make the incursion into my privacy acceptable? On December 1st, China’s regulation requiring people to have...

Stantinko botnet adds cryptomining to its pool of criminal activities

ESET researchers have discovered that the criminals behind the Stantinko botnet are distributing a cryptomining module to the computers they control The operators of the Stantinko botnet have expanded their toolset with a new means...

Notorious spy tool taken down in global operation

IM-RAT, which could be had for as little as US$25, was bought by nearly 15,000 people Law enforcement authorities in a number of countries have broken up a cybercriminal operation that peddled a notorious...

80% of all Android apps encrypt traffic by default

Google keeps pushing in its mission for broader encryption adoption Android commands the lion’s share of the mobile operating system market. And with so many users under its wings, it should come as no...

LATEST NEWS

MUST READ