New Facebook ad reporting tool launches in UK - Consumer expert Martin Lewis took Facebook to court over multiple rogue ads bearing his likeness. It's now been settled out of court, and Facebook users have a new tool in the fight against bad ads.
Threat Spotlight: Sodinokibi ransomware attempts to fill GandCrab void - There’s a new ransomware-as-a-service (RaaS) in town, and it can twist tongues for giggles as much as twist organizations' arms for cash. Get to know the Sodinokibi ransomware, including how to protect against this fledgling threat.
No man’s land: How a Magecart group is running a web skimming operation from a war zone - We take a look into a Magecart group's web skimming activities, which are relying on a bulletproof-friendly host in battle-scarred Luhansk, Ukraine to provide cover for their activities, safe from the reach of law enforcement and the security community.
Compromising vital infrastructure: problems in education security continue - While educational organizations lack funding they are high on the target lists of cybercriminals. Does one fact lead to another?
Hi, honey. It’s mom. My phone is acting funny again. - Often, older generations must turn to their progenitors for help with technology. What are their frustrations and concerns, and how can younger generations better help?
Meet Extenbro, a new DNS-changer Trojan protecting adware - We found a new Trojan that uses aggressive techniques, including blocking access to security sites, to deliver an adware bundler. Read up on what Extenbro can do and how to get this pest off your system.
A week in security (July 8 – 14) - A roundup of cybersecurity news from July 8–14, including secure data sending, federal data privacy law, the Soft Cell attack, and more.
Cellular networks under fire from Soft Cell attacks - We break down the recently revealed attacks on telco operators around the globe, targeting specific high-value individuals.
Caution: Misuse of security tools can turn against you - If not implemented correctly, the very security tools we use to keep our information private may actually cause data leaks themselves. We outline a few cases and provide suggestions for researchers and security admins.

Select your language