Please turn on your JavaScript for this page to function normally.
prison
Hacker who tried to spring friend from jail will end up in prison himself

A Michigan man by the name of Konrads Voits pleaded guilty to hacking Washtenaw County’s computer network and changing the Washtenaw County Jail records, with the intent …

Network
The next step in network security evolution

In 1987, Bernd Fix developed a method to neutralize the Vienna virus, becoming the first known antivirus software developer. In 2017, as we pass the 30-year anniversary, a lot …

firefighters
Andromeda botnet dismantled in international cyber operation

On 29 November 2017, the Federal Bureau of Investigation (FBI), in close cooperation with the Luneburg Central Criminal Investigation Inspectorate in Germany, Europol’s …

Danger
Ransomware’s lucrative next stop? The Point of Sale

With the influx of credit card breaches over the past few years at major brands, hackers may have reached a point of supply exceeding demand, as awareness of breaches, …

flame
Five key trends to watch in 2018 as cybercriminals continue to innovate

The McAfee Labs 2018 Threats Predictions Report identifies five key trends to watch in 2018. This year’s report focuses on the evolution of ransomware from traditional to new …

Android
Tizi backdoor rooted Android devices by exploiting old vulnerabilities

Google has discovered and removed from Google Play a number of apps that contained the Tizi backdoor, which installs spyware to steal sensitive data from popular social media …

danger
A look at the top seven ransomware attacks in the past decade

In part one of this series, we discussed exactly what ransomware is, including the effects of and motives behind different types of attacks. In this second article, I’ll look …

icosahedral
Not everything is sophisticated, let’s keep it simple

I don’t have dandruff. But if I did, then I could use a new sophisticated formula to cure my condition. Whether the problem is dandruff or a malware-related threat, the term …

gift
Holiday season scams: Fake deals, fake stores, fake opportunities

Black Friday is widely regarded as the beginning of the US (and increasingly global) Christmas shopping season. Cyber Monday, which comes three days later, was created to …

fire
Only 12% or organizations are likely to detect a sophisticated cyber attack

Organizations believe that today’s cyber threat landscape places them at high risk of cyber attacks. The EY survey of nearly 1,200 C-level leaders of the world’s …

Hand
Why hackers reuse malware

Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is …

Google Play
Sneaky malware downloader found in apps on Google Play

Google has removed from Google Play eight apps that have served as downloaders for Android banking malware. The malware The packages – a mixture of Android cleaners and …

Don't miss

Cybersecurity news