How scammers mine cryptocurrency at your expense

Originally developed for the needs of the US National Security Agency and made available to the public, the EternalBlue exploit was used to create the global WannaCry malware, which covered…

Check your PC: rating of the most dangerous programs

Be careful with these programs because they have serious security vulnerabilities that can help criminals gain access to your data. Federal Office for Information Security (FOIS) studied what weaknesses popular…

Your personal data: how can scammers use it?

At the end of October, another data leak occurred from Facebook: unknown scammers sold access to users' private messages, photos, and emails. Why are such leaks dangerous and what can…

6 scary robots that will haunt you in your dreams

Robotics is both exciting and terrifying at the same time. Delving into the world of robotic bodies and artificial intelligence, one is amazed at how creepy this area of ​​u200bu200bscience…