cybercrime
Android infostealer masquerading as MS Word document
A clever Android information-stealing piece of malware is lurking on third-party app markets popular with Chinese users.“The malware portrays itself as a data file with …
Hackers put up for sale 13 million plaintext passwords stolen from 000webhost
000webhost, a popular free web hosting service, has suffered a data breach that resulted in the compromise of the name, email address and plaintext password of some 13 million …
TalkTalk hack: Teenager arrested in Northern Ireland
A 15-year-old boy has been arrested in Northern Ireland in connection with the investigation into alleged data theft from the TalkTalk website.“On Monday, 26 October, at …
TalkTalk breach: Attackers demand £80,000 for stolen data
UK Telecom TalkTalk revealed on Friday that its website has suffered an attack, that it has been taken down as a precaution, and that names, addresses, dates of birth, email …
Nine arrested in UK investigation of criminal network defrauding bank customers
Detectives investigating an organized criminal network responsible for defrauding bank customers across the UK out of approximately £60 million have arrested nine …
12 new malware strains discovered each minute
G DATA researchers discovered a 64.8 percent spike of new malware strains as compared to the first half of 2014. This averages out to 12 new strains per minute. In all, the …
Tech support scammers start targeting users of Apple devices
With the rise of popularity and the widespread ubiquity of devices made by Apple, it was only a matter of time when tech support scammers would begin targeting that ever …
IS hackers are attacking the US energy grid
The US energy grid is under cyber attack from Islamic State hackers but fortunately, these attacks end up in failure because the hackers are simply not skilled enough to do …
8 key online fraud behaviors and patterns
Sift Science examined data from 1.3 million online transactions and profiles in various industries from August 2014 to August 2015. Data was cross-referenced with third-party …
8 key online fraud behaviors and patterns
Sift Science examined data from 1.3 million online transactions and profiles in various industries from August 2014 to August 2015. Data was cross-referenced with third-party …
Criminals hacked chip-and-PIN system by perfecting researchers’ PoC attack
When in 2010 a team of computer scientists at Cambridge University demonstrated how the chip and PIN system used on many modern payment cards can be bypassed by making the POS …
Private email account of CIA Director compromised by teenage hackers?
CIA Director John Brennan apparently got his private AOL email account hacked, and the attackers revealed that it contained information that shouldn’t have been there: …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader