Apple AirTag Zero-Day Weaponizes Trackers
In addition the hackers claimed to have accessed the login details of over 3000 Acer...
Read onEncrypted & Fileless Malware Sees Big Growth
VirusTotal’s first Ransomware Activity Report reveals that it received ransomware submissions from 140 different countries...
Read onApache Web Server Zero-Day Exposes Sensitive Data
Hardware and electronics giant Acer has suffered a data breach, with hackers claiming they have...
Read onIP Surveillance Bugs in Axis Gear
It’s one of the most serious threats facing organizations today, with the FBI estimating it caused...
Read onAll Source Code Leaked
The newspaper said it found that teachers’ Social Security numbers were contained in the HTML...
Read onNext Phase in Cyber Warfare
Prosecutors claim that the group targeted companies in the United States and around the world,...
Read onThe Coming AI Hackers
Man charged with hack which shared COVID-19 test details in protest against vaccine pass. More...
Read onSyniverse Hack
Eleanor Dallaway, the editor of InfoSecurity Magazine, was kind enough to invite me onto her...
Read onTracking Stolen Cryptocurrencies
One of those victims, according to the authorities, was a Boston-based company that says it...
Read onCheck What Information Your Browser Leaks
An Acer spokesperson confirmed that the company’s Indian offices had suffered a cyber attack. More...
Read onHardening Your VPN
A gang of three men has been charged with laundering the proceeds of a Business...
Read onA Death Due to Ransomware
Participation at all-time high for CyberFirst summer courses, led by the National Cyber Security Centre...
Read onFacebook Is Down
All this and much more is discussed in the latest edition of the award-winning “Smashing...
Read onConnecting your SOC with mobile teams
In it we discuss infosecurity rockstars, podcasts, how I would feel if I was stranded...
Read onRemote work worked, until it didn’t
According to prosecutors, Elkhebri’s alleged role in the plot was to open multiple bank accounts...
Read onEnd-to-end encryption and securing data
A married couple are accused of selling nuclear sub secrets, Facebook continues to make young...
Read onDeveloper Tools or simply right-clicking on the page
In other words, the information was available to anyone with a web browser who happened...
Read onThe hidden threat of business collaboration tools
Your organization risks compliance and disaster protection shortcomings unless your data management practices catch up...
Read on