Ransomware attackers have a good thing going: Lock or encrypt your PC remotely, then demand money to release it. Unfortunately, greed is driving them to do the one thing they shouldn't do if they want the cash to keep flowing.
Piecing together a full financial and medical profile—a so-called "fullz"—is how hackers turn your data into dollars. We talk to the experts about the fullz problem and what you can do about it.
Maybe you know not to plug strange USB drives into your computer, but trends indicate that most people think nothing of it. Here's how security experts keep USB malware at bay.
Criminals file for fraudulent tax refunds using consumers' information. Law firms are being hacked. The trend is clear: People have to worry about the security of their third parties. Lessons for consumers on what they should do to check out their providers' security.
In the past, if you had a backup of your files, you could avoid paying ransomware. Malware developers claimed to have added a new twist, threatening to publish the data of anyone who has not paid.
Caller ID is easy to spoof and it’s leading to a host of real threats, from account recovery fraud to marketing scams to malicious pranks resulting in SWAT teams showing up at a victim's door.
Online attackers are increasingly targeting websites to make a statement, send spam or flood someone else’s network. Protecting your online brand requires vigilance.
More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.
Security researchers needed just 5 to 20 minutes to hack most smart-home devices. Learn how to keep real hackers at bay with these five strategies.
Mobile malware tends to loiter in a few "bad neighborhoods" online that you should stay out of anyway.
If major companies can be breached, is there anything home users can do to escape the same fate? Plenty, say security experts.
We all have them, and now's the time to make them both hacker-proof and easier to manage.
You know those nagging Java update boxes that pop up in your desktop? They're actually kind of important.
Ransomware is on the rise. Your best protection? Something everyone knows they should do.
Smartwatches, smart homes, smart connected cars: All carry software vulnerabilities that could impact your privacy or safety. But you can be smart about knowing the risks before you buy.
Articles by Robert LemosNext Page