Here's a DHL delivery scam with a simple twist - simplicity and a total lack of drama...
Use of the kid-addicting, video-sharing app is exploding during lockdown, triggering yet another inquiry into how safe it is for young ones.
Someone on the dark web is touting for sale an unusual database a lot of people might pay handsomely to get their hands on.
Thunderbolt ports can provide direct access to the memory in your laptop... just how hard is it for crooks to do so when you aren't looking?
To understand the scope of the ransomware threat, Sophos commissioned a study into the state of ransomware 2020.
3.5 million user logins for the MobiFriends dating app are being offered for free on a popular dark web hackers forum.
The latest SophosLabs report tells the story of how the infamous "Maze" ransomware has evolved over the past 12 months...
Ransomware crooks are apparently threatening to dump personal data for a long of celebs including Lady Gaga, Madonna, Nicki Minaj and more.
… nor to anybody, even law enforcement, in the place where privacy-oblivious biometrics companies are forced to their knees: Illinois.
Microsoft really wants to secure the Internet of Things (IoT), and it's enlisting citizen hackers' help to do it.
If you enjoy what you read, hear and see from the Naked Security team, please vote for us - it means a lot!
Google deleted more malicious extensions from the Chrome Web Store after they were found to be phishing cryptocurrency users.
Here's a ransomware story with a bit of a difference. Some of your files get wiped out, but others can be recovered without paying.
Get the latest cybersecurity news, opinion and advice.
In April, the company yanked 1,887 misleading accounts, pages and groups tied to eight influencer networks building fake engagement.
Five alleged members of hacking group InfinityBlack got some unexpected visitors last week when Polish law enforcement arrested them.
Firefox's latest version is out, with new password management features and a raft of security fixes.
Researchers have poked another small hole in air gapped security by showing how the electronics inside computer power supply units (PSUs) can be turned into covert data transmission devices.
The leak exposed millions of records with full names, emails, user conversations, payment logs, and IP addresses dating back to March.