US embassy worker hacked for sex images
Ford committed the crimes while working at the US embassy in London A former US official has admitted stalking women and extorting sexually explicit material from them after hacking intoRead More →
Ford committed the crimes while working at the US embassy in London A former US official has admitted stalking women and extorting sexually explicit material from them after hacking intoRead More →
UK webhosting company Easily has emailed its customers to inform them that it has fallen victim to a malware attack. COO Edwina McDowall says that the assailant is, as yet,Read More →
FBI director James Comey called on tech companies to create backdoor access to their users’ data on Wednesday, arguing it was necessary to tackle everything from terrorism to child kidnapping.Read More →
Researchers watch the watchmen. Some of the biggest names in the security software business have been compromised by a serious flaw that could allow a hacker to use the commercialRead More →
Two years ago Google and NASA went halfsies on a D-Wave quantum computer, mostly to find out whether there are actually any performance gains to be had when using quantumRead More →
These are the times that we live in: the Raspberry Pi Zero comes out — a full freaking Linux computer on a chip for $5 — and people complain thatRead More →
MALVERTISING IS WHEN hackers buy ad space on a legitimate website, and, as the name suggests, upload malicious advertisements designed to hack site visitor’s computers. The news page looked perfectlyRead More →
nternet core infrastructure hit in rare cyber-attack.Unknown parties carried out a large-scale DDoS attack on the Internet’s DNS root servers, causing slight timeouts for four nodes, more exactly on theRead More →
China’s first mind-controlled car has been developed by researchers in the north-east port city of Tianjin. Chinese researchers have developed what they say is the country’s first car that usesRead More →
EVEN AS HIS face towered 10 feet above the crowd at the Bitcoin Investor’s Conference in Las Vegas, Craig Steven Wright was, to most of the audience of crypto andRead More →
Lately the threat actors behind Dridex malware have been very active. Across all the recent Dridex phishing campaigns the technique is the same. All the Microsoft Office documents containembedded macros thatRead More →
Apple has piled on the patches already released by Adobe and Microsoft today, and pushed out updates for iOS, OS X, Apple TV, Safari, and it’s watch-based operating system watchOSRead More →
The internet’s root servers came under a concerted distributed denial of service (DDoS) attack last week that effectively knocked three of the 13 critical pillars of the internet offline forRead More →
Social engineering is a pretty important item in a hacker’s toolkit.in Mr robot there was a time, we see Elliot, using social engineering to gain access to his therapist’s boyfriend’sRead More →
On September 11, 2015 I visited Media Markt in Utrecht Hoog Catherijne, a well-known electronics shop in The Netherlands. Since summer 2014, the biggest independent Dutch phone retail company Phone House also operates (whiteRead More →
The flaws can be exploited remotely through emails, Web pages, MMS and rogue apps. Google has released a new batch of security fixes for its Nexus smartphones and tablets, addressing flawsRead More →
Today at JSConf US Last Call in Florida, we announced that we will open-source the core components of Chakra as ChakraCore, which will include all the key components of theRead More →
BackStab technique helps criminals get their hands on your private data, via unprotected phone backups A recent report from Palo Alto Networks describes an attack technique called BackStab where malwareRead More →
Bootkit targeting banks and payment card processors hard to detect and remove. Malware targeting banks, payment card processors, and other financial services has found an effective way to remain largelyRead More →
Initial issues trickle down to other Java toolkits.Exactly a month ago, we were reporting on an issue that exposed many Java applications to security holes thanks to how developers handledRead More →