Why Unofficial WhatsApp Apps Are a Security Risk
YoWhatsApp is a popular MOD, but scammers encouraged users to download a fake version. It just goes to show why unofficial apps are a bad idea.
What Is a USB Drop Attack and How Can You Prevent It?
Got a USB drive but don't know what's on it? Cybercriminals could use this to attack your computer. Here's what you need to know.
What Is Fake Ransomware and Should You Be Worried About It?
Even if you pay the ransom, your files may be gone for good. Is there any way to know whether you can get your data back?
Think Your Phone Has Been Hacked? Here's What to Do Next
Think there's a problem with your iPhone or Android device? Here's what to do if your phone has been hacked.
What Is Crimeware and Is It the Same as Malware?
Malware is malicious software, but crimeware sounds like software that can be used to carry out crimes. So do they mean the same? Not quite...
Facebook Business Accounts Hacked via New PHP Version of Ducktail Malware
A PHP version of the Ducktail infostealer malware is being used to compromise Facebook Business accounts.
3 Signs Your Mac Is Infected With a Virus (and How to Check)
Is your Mac acting weird? It could be infected with a virus. Here's how to check for a virus on your Mac.
New Phishing-as-a-Service Tool Poses Significant Risks
A new phishing-as-a-service tool is making data theft that much easier for cybercriminals.
The 7 Most Common Causes of Data Breaches
Someone can hack a server, but there are much easier ways to gain access to the same information. Here's what to look out for to keep your data safe.
New "RatMilad" Android Malware Can Steal Data and Spy on Victims
A new kind of Android malware is being used against victims on smartphones to spy and steal data.
What Is the Dipladoks.org Redirect Malware? How to Remove It on Windows
If Dipladoks.org keeps popping up in Windows, here's how to fix it.
What Is Harly Malware on the Google Play Store?
This Trojan malware silently signs you up to expensive subscription services to empty your bank account. Here's what you need to know.
How to Spot and Avoid Malicious Attachments
Malware can be spread via email attachments, but what are the tell-tale signs of a malicious attachment? Here's what to look out for.
What Is BBBW Malware? How to Remove It and Restore Your Data
Scammers utilize different types of malware to hold your data hostage. Here's what to do if you suddenly find BBBW files on your device.
What Is FickerStealer Malware and How Can You Remove It?
FickerStealer is a type of malware that can steal information from primarily Windows devices. How does it work? And what can you do about it?
What Is the EICAR Test File and How Does It Work?
How can you test how effective your antivirus is? Is it really protecting you from malware? Here's a safe way to find out.
How to Install REMnux on VirtualBox
REMnux is a malware-oriented operating system based on the Linux kernel. Here's how to install and set it up on VirtualBox.
Hackers Exploit James Webb Telescope Image to Spread Malware
One of the stunning James Webb telescope images is now being used by malicious actors to spread malware among devices.
CosmicStrand Is a Deadly New Rootkit That Targets Motherboards
Motherboards can be hacked with the CosmicStrand rootkit. Here's how to stop a remote attacker taking control of your system.
Malicious Android Apps, Cast to Xbox One, You've Been Caught in a Phishing Scam, and Raspberry Pi Projects for Beginners
Our weekly tech podcast for technophobes features security news that affects the devices you use, as well as tips to make better use of your tech.