hacking

Visit/antivirus/28144/best-antivirus
antivirus

Best antivirus for Windows 10

Want to stay secure? Here's the best business-class protection around
30 Jun 2020
Visit/security/phishing/356211/phishing-attacks-target-unsuspecting-wells-fargo-customers
phishing

Phishing attacks target unsuspecting Wells Fargo customers

Over 15,000 Wells Fargo customers targeted in .ics phishing campaign
24 Jun 2020
Visit/security/hacking/356210/trump-administration-wants-to-enhance-the-security-of-gov-sites
hacking

Trump administration wants to enhance the security of .gov sites

The government hopes to strengthen defenses on all .gov sites to protect users
24 Jun 2020
Visit/technology/cryptocurrencies/356177/cybercriminals-use-elon-musks-name-in-a-giveaway-scam
Bitcoin cryptocurrency mining
cryptocurrencies

Cyber criminals use Elon Musk’s name in a giveaway scam

Cybercriminals used name-dropping Bitcoin vanity addresses to steal $2 million in two months
22 Jun 2020
Advertisement
Visit/security/data-breaches/356169/blueleaks-activists-publish-269gb-of-hacked-us-police-force-data
data breaches

Activists publish 269GB of hacked US police force data

DDoSecrets publish more than one million 'BlueLeaks' files including documents, videos and emails
22 Jun 2020
Visit/security/hacking/356152/searching-for-a-new-job-that-linkedin-job-offer-may-be-fake
LinkedIn on a mobile device
hacking

Searching for a new job? That LinkedIn job offer may be fake

Threat actors use fake job offers to dupe their victims in this attack
19 Jun 2020
Visit/security/hacking/356130/savvy-threat-actors-can-recover-conversations-using-lightbulbs
hacking

Savvy threat actors can recover conversations using lightbulbs

Lightbulb eavesdropping doesn’t even require a smart bulb
18 Jun 2020
Visit/security/hacking/356102/cia-vault-7-leak-woefully-lax-cyber-security
hacking

CIA Vault 7 leak blamed on "woefully lax" attitude to cyber security

Internal report reveals CIA division was ‘so focused on cyber weapons’ it neglected the security basics
17 Jun 2020
Advertisement
Visit/security/hacking/356058/senators-introduce-protecting-american-intellectual-property-act
hacking

Senators introduce the Protecting American Intellectual Property Act

“We need to stop pulling punches and go after thieves and hackers,” says Senator Sasse
12 Jun 2020
Visit/security/hacking/355965/check-point-software-of-resume-themed-malware
hacking

Check Point warns of resume-themed malware threat

Security firm claims resume-themed campaigns have doubled in the US in the past two months
8 Jun 2020
Advertisement
Visit/security/ransomware/355964/watch-out-for-fake-ransomware-decryption-tools
ransomware

Fake ransomware decryption tool double-encrypts user files

STOP Djvu decryptor encrypts a ransomware victim’s files with more ransomware
8 Jun 2020
Visit/security/phishing/355936/inky-announces-20m-series-b-funding-round
phishing

INKY announces $20M Series B funding round

Insight Partners brings total investment in the startup to $31.6M
4 Jun 2020
Visit/security/ransomware/355909/microsoft-issues-warning-about-new-ponyfinal-ransomware-attacks
Ransomware splash screen mockup
ransomware

Microsoft issues warning about new PonyFinal ransomware attacks

PonyFinal attackers “looking for targets of opportunity," says Misner
3 Jun 2020
Visit/security/data-breaches/355908/amtrak-guest-reward-suffers-a-data-breach
data breaches

Amtrak Guest Reward suffers a data breach

Amtrak discloses unauthorized third-party access to Amtrak Guest Rewards accounts
3 Jun 2020
Advertisement
Visit/security/cyber-security/355903/brand-impersonation-and-form-based-attacks-are-rising
Hacking on keyboard
cyber security

Brand-impersonation and form-based attacks are rising

Google sites alone accounted for 65% of all form-based attacks between January and April
3 Jun 2020
Visit/security/ransomware/355891/nasa-it-contractor-ransomware-hack
ransomware

Ransomware collective claims to have hacked NASA IT contractor

DopplePaymer claims to have hit digital transformation firm, seizing sensitive documents and encrypted thousands of servers
3 Jun 2020
Visit/wannacry/34352/what-is-wannacry
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
2 Jun 2020
Visit/security/hacking/355858/hackers-are-targeting-the-education-sector
hacking

Hackers are targeting the education sector

The health care industry isn’t the only one falling prey to hackers during the coronavirus pandemic
1 Jun 2020
Visit/security/hacking/355854/hackers-wreaking-havoc-on-googles-cloud-infrastructure
hacking

Hackers are wreaking havoc on Google’s Cloud infrastructure

Attackers use Google Firebase storage URLs to trick users into giving up their login credentials
1 Jun 2020
Visit/penetration-testing/34465/whats-the-difference-between-active-and-passive-reconnaissance
Figure walking through keyhole
penetration testing

Active vs passive reconnaissance

Exploring essential tools of both ethical and malicious hackers alike
29 May 2020
Advertisement
Visit/security/phishing/355810/zloader-malware-returns-as-a-coronavirus-phishing-scam
Data on screen, viewed by shadowy hacker
phishing

ZLoader malware returns as a coronavirus phishing scam

Hackers have used ZLoader in 100 email campaigns in 2020
27 May 2020
Visit/security/hacking/355806/anarchygrabber-hack-steals-discord-tokens-ids-and-passwords
hacking

AnarchyGrabber hack steals Discord tokens, IDs and passwords

New trojan software corrupts Discord’s JavaScript files to get your private data
27 May 2020
Visit/security/hacking/355801/scammers-using-coronavirus-contact-tracing-in-hacking-attempt
hacking

Scammers leverage contact-tracing in hacking attempt

Savvy scammers use contract tracing texts to dupe users into handing over personal information
27 May 2020