Reported cases of webcam blackmail double, are linked to four suicides
864 cases this year in the UK; true figure is likely much higher. The number of reported webcam blackmail cases has more than doubled in the past year, and atRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
864 cases this year in the UK; true figure is likely much higher. The number of reported webcam blackmail cases has more than doubled in the past year, and atRead More →
Security expert discovers flaw in Windows 10 in-place upgrade system that gives hackers admin rights. Getting administrator privileges on a Windows 10 computer no longer requires complex tactics and malware,Read More →
Benjamin Dumke-von der Ehe found an interesting way to steal data cross domain. Using JS proxies he was able to create a handler that could steal undefined JavaScript variables. ThisRead More →
Publicly released exploit works reliably against a wide range of Firefox versions. There’s a zero-day exploit in the wild that’s being used to execute malicious code on the computers ofRead More →
PayPal fixed an issue that could have allowed an attacker to hijack OAuth tokens associated with any PayPal OAuth application. The vulnerability was publicly disclosed on Monday by Antonio Sanso,Read More →
Security experts who conducted an audit on cURL discovered nearly a dozen vulnerabilities that were patched in the last release. The cURL (read “see URL”) is an open source command line toolRead More →
The Kangaroo ransomware is the latest ransomware from the developer behind the Apocalypse Ransomware, Fabiansomware, and Esmeralda. What makes this version stand out a bit more is the use ofRead More →
The San Francisco Municipal Transportation Agency (SFMTA) was hit with a ransomware attack on Friday, causing fare station terminals to carry the message, “You Hacked. ALL Data Encrypted.” Turns out, theRead More →
Researchers detect barrage of exploits targeting potentially millions of devices.Online criminals—at least some of them wielding the notorious Mirai malware that transforms Internet-of-things devices into powerful denial-of-service cannons—have begun exploitingRead More →
On Oct. 27 of this year, a contractor told the US Navy that one of its employee’s laptops was “compromised,” resulting in the theft of personal data, including social securityRead More →
Bounty hunter Kevin Roh has discovered several security vulnerabilities in the Uber UberCENTRAL Tool that exposed user data. Security expert and bounty hunter Kevin Roh has discovered several security vulnerabilities in Uber’s UberRead More →
The technical nature of cyber crime can sometimes obscure the fact that creating, using, and distributing malware, phishing kits and other threats is a business, albeit an illegitimate one. LikeRead More →
Short Bytes: The Tor Project has released Tor Phone–a privacy-focused and secure version of Android mobile OS. It’s based on Copperhead OS, a hardened Android distribution. Tor Phone also usesRead More →
They promised they’d fix the issues and they didn’t, hacker says, so this latest breach shows better security is needed. India is making the security headlines once again, this timeRead More →
Our researchers have demonstrated that because of lack of security in the Tesla smartphone app, cyber criminals could take control of the company’s vehicles, to the point where they canRead More →
Websites offering free keygens for various enterprise software applications are helping crooks spread the Gatak malware, which opens backdoors on infected computers and facilitates attacks on a company’s internal network,Read More →
An ongoing spam campaign is using boobytrapped image files to download and infect users with the Locky ransomware, Israeli security firm Check Point reports. aMalware authors are spreading malicious imageRead More →
The European Commission was the victim of a massive DDoS attack that brought down its internet access for hours on Thursday. A massive DDoS attack targeted the European Commission website, fortunately,Read More →
Criminal gangs like the Cobalt gang are now focusing their efforts on the banks to steal cash directly from the ATMs with jackpotting attacks. Security experts are assisting a changeRead More →
MSG acknowledges attack aimed at its payment systems. “If you used the credit card to pay for items at Madison Square Garden you might want to check your account balanceRead More →