Blog: In The News
You are here: Home \ Blog
IT companies allege that one of New Zealand’s largest networks of doctors and nurses has been storing hundreds of thousands of sensitive patient records, without express consent.
Buyers and sellers can exchange cash in person, transfer bank funds online or can exchange funds for prepaid cards, gift cards or other cryptocurrencies.
Changes in the group’s script may indicate that the hackers may start using attack vectors other than ActiveX.
DDoS attacks is relentless. New techniques, new targets and a new class of attackers continue to reinvigorate one of the internet’s oldest nemesis.
Researchers found a new version of GandCrab – but no evidence that the ransomware is using the same SMB exploit as Wannacry.
Noted cryptographer waxes on the threats posed by physical cyber systems, ‘going dark’ and a crypto arms race.
A new phishing scam purports to be MYOB invoices – but really contains a novel banking trojan.
Indictments are part of special counsel Robert Mueller’s investigation of Russian interference in the 2016 elections.
Cyberattackers have used a bogus mobile device management (MDM) system to target a small – but presumably high-value – set of iPhones in India in a cyberespionage campaign that has some unusual hallmarks.
HackerOne’s 2018 Hacker-Powered Security Report showed that the average award for critical vulnerabilities has increased.
... 151617181920212223 ... 27 ... 36 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ... 135 ... 144 ... 153 ... 162 ... 171 ... 180 ... 189 ... 198 ... 207 ... 216 ... 225 ... 234 ... 243 ... 252 ... 261 ...