A week in security (August 23 – August 29)

A round-up of the most interesting blog posts and security news happenings for the week of August 23 to August 29.

Read more

Cold wallet, hot wallet, or empty wallet? What is the safest way to store cryptocurrency?

Cold wallet, hot wallet, or empty wallet? What is the safest way to store cryptocurrency?

Read more

DOJ recovers pipeline ransom, signals more aggressive approach to cybercrime

The US Department of Justice announced Monday that it recovered much of the ransomware payment that Colonial Pipeline paid to Darkside.

Read more

Fintech security: the challenges and fails of a new era

The fintech industry has gone through some dramatic changes during the last decade and is still trying to adapt. Is security still one of their priorities?

Read more

Steer clear of Bitcoin Cash generators

We take a look at a number of sites claiming to offer free Bitcoin Cash money.

Read more

Threats target financial institutions, fintech, and cryptocurrencies

Losing trust in financial institutions can have a disrupting effect on society. And malware authors love to target these direct sources of money. How can we protect them?

Read more

Explained: Payment Service Directive 2 (PSD2)

PSD2 is coming to the EU. What is it? How will it be used? What are the implications? Many questions and some answers and recommendations.

Read more

A week in security (February 4 – 8)

A roundup of security news from February 4 – 8, including Facebook’s secure messaging integration, Google’s changes to URLs, a scam involving the Kindle store and John Wick, and more.

Read more

A week in security (October 29 – November 4)

A roundup of security news from October 29 to November 4, including more problems with home hubs, phishing attack spikes, massively popular ransomware, and spies being charged for blueprint theft.

Read more

Mac cryptocurrency ticker app installs backdoors

A Mac application named CoinTicker has been found installing two different backdoors, capable of keylogging, data theft, execution of arbitrary commands, and more.

Read more

Select your language