Shopaholics: Beware of Risky Wi-Fi
As the days grow shorter and twinkly lights pop up on houses lining the block, one thing is clear: the...
From the Cloud to Drones: Threat Predictions for 2017
2016 has been quite the year. From widespread IoT attacks, to ransomware campaigns that extract millions of dollars, cyberthreats have...
Bypassing Your Passcode: How One Online Hack Can Unleash Your Photos and Texts
You keep some of your most personal information on your phone. Special photos, hundreds of contacts, important emails, private...
So You Think Your Phone Is Hacked—Here’s What to Do
Humans are private by nature. We may share an inspiring article or photos from a fun trip, but we keep...
App Store Flooded with Phony Retail Apps to Kick Off Holiday Season
The holiday season has officially kicked off, which means a number of things for many of us: seasonal cheer, quality...
Boo! The Spookiest Mobile Hacks of 2016
Endless candy, an excuse to dress up as a character from your favorite comic book, and carving pumpkins with family…...
Android Banking Trojan Asks for Selfie With Your ID
In the first half of 2016 we noticed that Android banking Trojans had started to improve their phishing overlays on legitimate financial...
Everyone Loves Selfies, Including Malware!
This blog was written by Bruce Snell. I was talking with some of my coworkers the other day about why...
What You Need to Know About iOS 10
In the 2013 indie romance, “Her,” Joaquin Phoenix’s on-screen lover wasn’t another stunning A-list actress, but something less expected and...
How a Backpack Stuffed with Spy Tech Can Pry into WhatsApp
We use backpacks to carry our portable technology. But now they can carry a new technology that gets inside those...