Cybercrime & Hacking

Cybercrime and hacking news, trends, analysis and practical advice

trump thoughful
cyberattack

iphone security stock

Scammers scare iPhone users into paying to unlock not-really-locked Safari

Apple has patched a bug in the iOS version of Safari that was used by criminals to spook users into paying $125 or more because they thought the browser was broken.

21394517746 9a77570fae o

Newly leaked documents show low-level CIA Mac and iPhone hacks

The CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.

girl hands privacy stop

Private photos of more celebrities leaked in Fappening 2.0

Photos and videos of more and more celebrities leak in the latest round The Fappening 2.0.

Russia

U.S. faces limits in busting Russian agents over Yahoo breach

In a rare move, the U.S. has indicted two Russian spies for their suspected involvement in a massive Yahoo data breach. But what now?

FBI

4 charged, including Russian gov't agents, for massive Yahoo hack

The Department of Justice charged four people, including two Russian state intelligence agents, for their involvement in a massive hack of Yahoo that affected half a billion accounts.

spying tv

Of course your TV’s spying on you

It has been since it got smart, and so are most of the websites you visit, your Amazon Echo and every voice-activated smart device in your house.

cia cyber

CIA hacking tools targeting Windows

These purportedly are a few of the 'secret' tools in the CIA arsenal that target the Windows operating system.

cia cyber

If the CIA can sidestep encryption, what makes you think cyberthieves can’t?

New Wikileaks documents show agents simply refining standard techniques of cybercriminals.

cia

CIA-made malware? Now antivirus vendors can find out

Thanks to WikiLeaks, antivirus vendors will soon be able to figure out if you have been hacked by the CIA.

Legislation of privacy security keyboard law legal gavel court ruling

U.S. drops child porn case to avoid disclosing Tor exploit

The U.S. Department of Justice is asking a federal court to dismiss its indictment in a case that involves a child porn site known as Playpen, after a judge asked the government to disclose the hacking technique it used to gather...

malware threat hack hacked bug cyberthreat

Dridex: First banking Trojan with AtomBombing to better evade detection

Dridex v4 includes an AtomBombing technique upgrade so the malware is even better at evading detection.

fake email

A better security strategy than ‘know your enemy’: Know your co-workers

Something as simple as an uncharacteristic turn of phrase can clue people into an email’s illegitimacy.

connected nodes network

Understanding the attack surface to better allocate funds

How CISOs can be better informed and get ahead of attacks.

dl speedport hybrid

Police arrest man suspected of building million-router German botnet

Last year, someone turned a German internet service provider into a million-router botnet. German police think they will soon have the culprit.

img 20160625 202609

A hard drive's LED light can be used to covertly leak data

The seemingly harmless blinking lights on servers and desktop PCs may give away secrets if a hacker can hijack them with malware.

President Donald Trump and Vice President Mike Pence

Indiana joins Idaho in claiming DHS tried to hack their election systems

Indiana claims DHS scanned the state's electoral system tens of thousands of times without permission.

RSA

Here’s how the U.S. government can bolster cybersecurity

Almost 20 years ago, Chris Wysopal was among a group of hackers who testified before Congress, warning about the dangers of the internet.

11 hacker keyboard user laptop

7 tips to turn threat data into true threat intelligence

Threat intelligence can be your best friend or your worst enemy. Here are some tips to make sure you are making the most of it.

Load More