NoReboot: A fake restart to gain a foothold in the system
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.
Can you be sure your employees are working responsibly with personally identifiable information?
Remembering 2021’s most interesting infosec events — in memes and tweets.
Our Danish colleague spilled a lot of cybersecurity ink in his works.
To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails.
A look at what’s changed in the Matrix in the 18 years since the last update.
A cyberattack has affected an unexpectedly large number of industrial systems.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Free yourself from social media and start living again.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
Here’s how to open a program if your antivirus app blocks it.