Real-world hackers can 3D-print your keys
One thing you might not know about hackers is that besides cracking some virtual systems many of them are fond of hacking real world stuff as well. One thing ofRead More →
One thing you might not know about hackers is that besides cracking some virtual systems many of them are fond of hacking real world stuff as well. One thing ofRead More →
Hacked casino operator alleges breach continued while Trustwave was investigating. A Las Vegas-based casino operator has sued security firm Trustwave for conducting an allegedly “woefully inadequate” forensics investigation that missedRead More →
The stolen Bitcoin & Litecoin were worth over $5.7 million. Cryptsy, a website for trading Bitcoin, Litecoin, and other smaller crypto-currencies, announced a security incident, accusing the developer of Lucky7Coin ofRead More →
Apple has had two cracks at patching a vulnerability that allows malicious apps to bypass its OS X Gatekeeper security feature, and twice has taken a shortcut approach to theRead More →
Security firm Damballa says that when computer crime cops in Norway arrested five men last month in a joint operation with Europol, one of them was the creator of theRead More →
Data for 18,000 users stolen in the incident. The website of the Faithless British EDM band has been breached and the personal information of over 18,000 fans stolen by a yetRead More →
OpenSSH today released a patch for a critical vulnerability that could be exploited by an attacker to force a client to leak private cryptographic keys. The attacker would have to controlRead More →
A large number of countries aren’t prepared to deal with cyberattacks on their nuclear energy system. By coincidence, two studies were released yesterday that put more light on the sorryRead More →
NOT SO LONG ago, the Silk Road was not only a bustling black market for drugs but a living representation of every cryptoanarchist’s dream: a trusted trading ground on theRead More →
We are all very familiar with URL shortening services, which are regularly used in Tweets and other social media. It is no secret that cyber criminals also use URL shortenersRead More →