Please turn on your JavaScript for this page to function normally.
Nest
Computer science student discovers privacy flaws in security and doorbell cameras

Ring, Nest, SimpliSafe and eight other manufacturers of internet-connected doorbell and security cameras have been alerted to systemic design flaws discovered by Florida Tech …

lock
COVID-19 has contributed to record breaking cybercriminal activity

There has been an exponential growth in phishing and website scams in Q1 2020, according to a Bolster analysis of over 1 billion websites. 854,441 confirmed phishing and …

industry
Advanced attack scenarios and sabotage of smart manufacturing environments

Advanced hackers could leverage unconventional, new attack vectors to sabotage smart manufacturing environments, according to Trend Micro. Industry 4.0 Lab, the system that …

laptop
Massive work-from-home movement exposes cybersecurity weaknesses

News coverage of the recent uptick in cyber threat activity is showing an incomplete picture. Despite the focus on VPN hacks and attacks at home, computers at more than 50,000 …

Samsung
Large number of mobile apps may be vulnerable to hacking

A team of cybersecurity researchers has discovered that a large number of mobile apps contain hardcoded secrets allowing others to access private data or block content …

chip
Most computers easy to hack due to vulnerability in memory chips

Most computer systems are still very easy to hack, due to a vulnerability in memory chips produced by Samsung, Micron and Hynix, according to a study by researchers from VUSec …

hand
IRS scams during tax season target unsuspecting consumers

Scam robocalls and phishing emails disguised as banks continue to trick consumers to put their personal information at risk, and tax season is no exception. Increase in …

Trojan horse
Hackers are getting hacked via trojanized hacking tools

Someone has been trojanizing a wide variety of hacking tools to compromise the machines of hackers who want to use the tools for free, Cybereason researcher Amit Serper has …

mobile apps
Hackers using hidden mobile apps and unique distribution methods to target consumers

Hackers are using hidden mobile apps, third-party login and counterfeit gaming videos to target consumers, according to McAfee. Worldwide detections of LeifAccess, 2019 Last …

Hands
Hacking has become a viable career, according to HackerOne

HackerOne announced findings from the 2020 Hacker Report, which reveals that the concept of hacking as a viable career has become a reality, with 18% describing themselves as …

healthcare
Number of records exposed in healthcare breaches doubled from 2018 to 2019

In 2019, healthcare data breaches collectively affected over 27 million individuals, according to Bitglass. Categories of breaches Hacking or IT incidents: Breaches related to …

danger
In 2019, a total of 7,098 reported breaches exposed 15.1 billion records

In 2019 the total number of records exposed increased by 284% compared to 2018, according to Risk Based Security. 2019 saw an increase in reported breaches In total, there …

Don't miss

Cybersecurity news