CIA Email Hackers Return With Major Law Enforcement Breach
HACKERS WHO BROKE into the personal email account of CIA Director John Brennan have struck again. This time the group, which goes by the name Crackas With Attitude, says itRead More →
Data Security News | Infosec Blog | Information Security Tutorials
HACKERS WHO BROKE into the personal email account of CIA Director John Brennan have struck again. This time the group, which goes by the name Crackas With Attitude, says itRead More →
Rafael Salema Marques is a Brazilian cyber-security researcher and, above all, a devoted Mac user. Today, Mr. Marques published a LinkedIn blog post and proof-of-concept video on YouTube, detailing aRead More →
We’re your servants, says general counsel unconvincingly After spending months pressuring tech companies to add backdoors into their encryption software, the FBI says it has given up on the idea.Read More →
Follow-on attacks show capabilities “commonly possessed by state-sponsored actors.” A provider of end-to-end encrypted e-mail said it paid a ransom of almost $6,000 to stop highly advanced denial-of-service attacks thatRead More →
Cyber-security vendors are revealing their statistics for the third quarter (Q3) of 2015, and a popular topic is DDoS attacks, a tactic widely used to mask more serious intrusions, toRead More →
IPB The encryption bothering parts of the UK’s Investigatory Powers Bill have left IT security experts flabbergasted. Introducing the draft internet surveillance law in the House of Commons on Wednesday,Read More →
A cybersecurity expert once told me something I’ll never forget: “don’t underestimate what bored teenagers can do.” A group teenagers that call themselves “Crackas With Attitude” reminded me of thoseRead More →
Customers of Russia’s biggest banks are under attack.Dell SecureWorks has detected an ongoing campaign that is targeting users of several Russian banks and payment service providers. The cyber-criminals behind thisRead More →
Even reports of crims offering signing-as-a-service. Underground cybercrooks are selling digital certificates that allow code signing of malicious instructions, creating a lucrative and expanding cottage industry in the process, accordingRead More →
Our Remediation and Research teams are in constant communication and collaboration. It’s how we stay ahead of the latest threats, but it also presents an opportunity to identify interesting threatsRead More →