Who’s hacking schools now? The students
The cyberattack that knocked hundreds of school networks offline in Japan last week had at least one novel feature: It was allegedly instigated by a student. A 16-year-old high schoolRead More →
Data Security News | Infosec Blog | Information Security Tutorials
The cyberattack that knocked hundreds of school networks offline in Japan last week had at least one novel feature: It was allegedly instigated by a student. A 16-year-old high schoolRead More →
Notice follows reported breaches at customer sites in Bangladesh, Vietnam and Ecuador Attendees of a finance conference visit the Society for Worldwide Interbank Financial Telecommunication stand during at the DubaiRead More →
Active attack targets Internet-connected radios from Ubiquiti Networks. ISPs around the world are being attacked by self-replicating malware that can take complete control of widely used wireless networking equipment, according toRead More →
University of Texas researchers find a way to merge two low-quality sources of random numbers into high-quality output. Two researchers from the University of Texas have published a paper thatRead More →
Phineas Fisher donates 25 Bitcoin to Syria’s Rojava region.Phineas Fisher, also known as Hack Back, the hacker who breached Hacking Team last summer, revealed on Reddit yesterday that he hackedRead More →
In surprising end to TeslaCrypt, the developers shut down their ransomware and released the master decryption key. Over the past few weeks, an analyst for ESET had noticed that the developers of TeslaCrypt haveRead More →
While facial recognition technology has a number of positive uses, such as finding missing people, an alternative form of ID, and even tagging friends on Facebook, it does have worryingRead More →
More suspects are expected to admit their crimes as well. Vadym Iermolovych, 28, of Kiev, Ukraine, pleaded guilty yesterday for his role in the hacking of business newswire services Marketwired, PRRead More →
Tech support scammers are well aware of what is going on in the malware scene and often rip off ideas and concepts from other criminals. We see this today with for exampleRead More →
According to the global perspective of enterprise data security company; integrity, confidentiality, availability, auditability, and non-repudiation are the five fundamental pillars for any business data security solution. For small andRead More →