UMICH researchers remotely pick locks of Samsung SmartThing connected home systems

UMICH researchers remotely pick locks of Samsung SmartThing connected home systems

In a series of attacks, University of Michigan researchers hacked into Samsung SmartThing connected home systems and remotely unlocked doors.

Judge compels woman to provide fingerprint to open Apple iPhone

Judge compels woman to provide fingerprint to open Apple iPhone

The FBI recently pressed for a 29-year-old Los Angeles woman to provide her fingerprint to open her phone after she was sentenced in an identity theft case.

Pwnedlist vulnerability exposed 866M accounts

Pwnedlist vulnerability exposed 866M accounts

A Michigan school district network engineer discovered a security vulnerability affecting the pwnedlist.com service that exposed 866 million account credentials.

Mobile devices still vulnerable to attack, report

Mobile devices still vulnerable to attack, report

Mobile attacks can workaround two-factor authentication on Android phones and inject malware onto iOS phones.

Bernie Sanders drops DNC suit after probe confirms campaign's claims

Bernie Sanders drops DNC suit after probe confirms campaign's claims

After an investigation confirmed that data was exported during a December breach of the DNC voter file system but cleared the Sanders campaign of wrongdoing, the presidential hopeful withdrew a lawsuit it had filed against the DNC.

First Choice Credit Union files class-action suit against Wendy's over breach

First Choice Credit Union files class-action suit against Wendy's over breach

Claiming that Wendy's didn't properly protect data, First Choice Credit Union filed a class action lawsuit against the retailer over a breach experienced last year.

Top NFL prospect Tunsil free falls in draft after apparent hacker posts damaging video, texts

Top NFL prospect Tunsil free falls in draft after apparent hacker posts damaging video, texts

Minutes before the NFL Draft commenced on Thursday night, an apparent hacker accessed the Twitter account of top prospect Laremy Tunsil and posted an old video of the Ole Miss player smoking from a bong, damaging his value.

Researchers spot Android Infostealer disguised as Chrome update

Researchers spot Android Infostealer disguised as Chrome update

Zscaler researchers spotted an Android infostealer disguised as a Google Chrome update that is capable of terminating antivirus applications and even ending calls.

Researchers spot mobile malware competition on the black market

Researchers spot mobile malware competition on the black market

IBM security researchers have spotted an uptick in mobile malware competition in pricing, features and quality on the black market.

Judge ruled go ahead for claims of phone hacking against UK tabloid

Judge ruled go ahead for claims of phone hacking against UK tabloid

High Court judge Mr. Justice Mann has ruled the go ahead for claims against The Sun newspaper for phone hacking.

CryptXXX ransomware being served by toy company site

CryptXXX ransomware being served by toy company site

The day after security researchers discovered the website for toy maker Maisto was not only selling radio-controlled cars and planes, but was also pushing CryptXXX ransomware, the site was down for maintenance.

Prognosis Negative for American Dental Association

Prognosis Negative for American Dental Association

Malware embedded on a USB drive was delivered to members of the American Dental Association (ADA).

Marcher banking malware hitting Australia

Marcher banking malware hitting Australia

Marcher Madness continues with a new, stealthier iteration of the Marcher banking malware targeting Android users in Australia.

Belgian minister of defence stresses investing in cyber-security

Belgian minister of defence stresses investing in cyber-security

Belgium's minister of defence, Steven Vandeput has stated the importance of investing in technology for national security.

Turkish fascists claim responsibility for Qatar bank data breach

Turkish fascists claim responsibility for Qatar bank data breach

Qatar National bank has had 1.4 GB of internal files published online including the names of intelligence agents, government departments and the Qatari royal family. A turkish fascist group has claimed responsibility.

Ransomware rampant, but chinks found in its armor

Ransomware rampant, but chinks found in its armor

To say that a day does not pass without a ransomware attack being perpetrated upon an organization somewhere the United States is no hyperbolic statement, but there is a glimmer of hope as several defective ransomware variants have been found.

Mining company's data is more valuable than gold

Mining company's data is more valuable than gold

Hackers reportedly posted employee data and private documents belonging to a publicly listed gold-mining company on a paste site.

PCI DSS version 3.2 release extends multifactor authentication requirement

PCI DSS version 3.2 release extends multifactor authentication requirement

The PCI Data Security Standard version 3.2 released Thursday not only includes new requirements to safeguard payment data, including multifactor authentication.

RSA EMEA Summit: Writing a security strategy that will make Vivaldi proud

RSA EMEA Summit: Writing a security strategy that will make Vivaldi proud

Richard Nichols, RSA's head of EMEA strategy compared playing the violin to conducting an effective security strategy, to encourage businesses to harmonise security strategy and promote greater visibility of threats on the business.

U.S. CIO hints federal adoption of 'bimodal IT' to balance old and new tech

U.S. CIO hints federal adoption of 'bimodal IT' to balance old and new tech

U.S. Chief Information Officer Tony Scott Tuesday hinted his office may be working to help guide federal agencies to adopt "bimodal IT."

Attackers exploit MS Windows 'God Mode' for evil ends

Attackers exploit MS Windows 'God Mode' for evil ends

It appears that the developer mode of MS Windows, otherwise known as 'God Mode', is being leveraged by attackers to hide malware.

Senate committee leaders ask OMB to update 15-year-old cyber policy

Senate committee leaders ask OMB to update 15-year-old cyber policy

In a letter to the OMB, Senate Homeland Security Committee Chairman Ron Johnson and ranking member Tom Carper asked the agency's director Shaun Donovan to complete changes to a privacy and cyber policy framework.

Singtel opens unique cyber-security institute in Asia-Pacific

Singtel opens unique cyber-security institute in Asia-Pacific

Singapore Telecommunications (Singtel) has opened a new facility to help enterprises enhance cyber-security skills and test their networks in dealing with cyber-threats.

RSA Summit: Gibson urges information sharing to beat ransomware

RSA Summit: Gibson urges information sharing to beat ransomware

The director of CERT UK laid out some of the problems facing UK cyber-space and outlined what cyber-security could do to help fix them.

37% of Brits share personal login details with friends or partners

37% of Brits share personal login details with friends or partners

Over 10 percent of the UK population has pretended to be someone else online by snooping or sending messages through someone else's social media or email accounts without their permission.

Estonian man sentenced to 87 months for perpetrating click-fraud scheme

Estonian man sentenced to 87 months for perpetrating click-fraud scheme

A Manhattan federal court judge sentenced Estonian Vladimir Tsastsin to 87 months in prison for his role in perpetrating an internet fraud scheme that infected more than four million computers in more than 100 countries.

Uniting pro-ISIS hacking groups still unsophisticated, but sharpening skills, report says

Uniting pro-ISIS hacking groups still unsophisticated, but sharpening skills, report says

Pro-ISIS hacking groups joining forces behind a super-hacker team, the United Cyber Caliphate, are sharpening their skills and showing a willingness to coordinate and amp up cyberattacks, a new report revealed.

New site on dark web offering one-stop ransom services

New site on dark web offering one-stop ransom services

A new site was discovered on the dark web that allows hackers to upload stolen data and sell the data to criminals or criminal groups.

Automakers, Uber, Google form Self-Driving Coalition for Safer Streets as GAO releases vehicle cybersecurity report

Automakers, Uber, Google form Self-Driving Coalition for Safer Streets as GAO releases vehicle cybersecurity report

Automakers form join forces in the Self-Driving Coalition for Safer Streets coalition one day after the GAO released auto cybersecurity report.

Researchers create imaginary mobile devices to deceive Waze, other location-based apps

Researchers create imaginary mobile devices to deceive Waze, other location-based apps

Researchers from the University of California, Santa Barbara have uncovered a hacking technique that could allow bad actors to sabotage location-based mobile apps by simulating large number of devices that don't actually exist.

House passes EPA in unanimous vote

House passes EPA in unanimous vote

The House Wednesday passed the Email Privacy Act (EPA) 419-0, a reformation of the aging Electronics Privacy Act (ECPA) and drew immediate praise from rights groups.

PLATINUM gang exploited Microsoft 'hotpatching' support to mask activities

PLATINUM gang exploited Microsoft 'hotpatching' support to mask activities

The PLATINUM team has "gone to great lengths" over many years "to develop covert techniques" so their cyber-espionage campaigns will evade detection, even using Windows's support for "hotpatching" against it.

FBI won't reveal method used to crack iPhone, alerts Apple to iPhone, Mac flaws

FBI won't reveal method used to crack iPhone, alerts Apple to iPhone, Mac flaws

The Federal Bureau of Investigation won't share the method that was used to unlock an iPhone 5c used by one of the San Bernardino shooters because the mechanism belongs to the third party who cracked the phone.

Phishing, POS and stolen credentials top data breach methods: Verizon

Phishing, POS and stolen credentials top data breach methods: Verizon

Verizon's 2016 Data Breach Investigative Report (DBIR) discovered something the late, great steel driving man John Henry learned the hard way; humans don't stand a chance when it comes to battling soulless machinery

Over 7M Minecraft mobile credentials exposed after Lifeboat data breach

Over 7M Minecraft mobile credentials exposed after Lifeboat data breach

Lifeboat Network, which runs servers for Minecraft Pocket Edition — the smartphone version of the immensely popular video game Minecraft — was hacked in January 2016, resulting in a data breach compromising 7 million-plus gamers.

Malware in nuclear power plant prompts plant shutdown

Malware in nuclear power plant prompts plant shutdown

Malware discovered at a nuclear power plant in Germany prompted RWE AG to shut down the power plant as a precaution.

UK public approve of Investigatory Powers Bill 'in spirit'

UK public approve of Investigatory Powers Bill 'in spirit'

Though deeply unpopular in some circles, a new YouGov poll has shown broad approval for the enumeration of government surveillance powers in the Investigatory Powers Bill.

SWIFT confirms additional cyberattacks on its messaging system

SWIFT confirms additional cyberattacks on its messaging system

The financial messaging organization SWIFT has issued a warning to its customers stating its system has undergone repeated attacks similar to those that lead to $81 million from a Bangladesh bank.

CyberCenturion crown goes to team from Gibraltar

CyberCenturion crown goes to team from Gibraltar

A team from Gibraltar won the final round of the CyberCenturion 2016 competition held at Bletchley Park's National Museum of Computing today.

73% of global brands and organisations hit with DDoS attack in 2015

73% of global brands and organisations hit with DDoS attack in 2015

With the bombardment of DDoS attacks fairly consistent worldwide throughout 2015, it's no longer a matter of if or when attacks might happen, but how often and how long the attack will last.

Locky ransomware spotted using Javascript downloader

Locky ransomware spotted using Javascript downloader

FireEye researchers observed a Locky ransomware campaign that used Javascript downloaders to infect users rather than macro- or binary-based downloaders.

Retailers believe breach detection is sufficient, but gap yawns wide

Retailers believe breach detection is sufficient, but gap yawns wide

Retailers believe they can detect a data breach in a week or less, a new survey commissioned by Tripwire revealed, while another report by Arbor Network showed it takes them on average 197 days to spot advanced threats.

Info on 1.2M BeautifulPeople.com users sold on dark web after breach

Info on 1.2M BeautifulPeople.com users sold on dark web after breach

The personal information of 1.2 million members of the "exclusive" dating site BeautifulPeople.com is being sold on the dark web.

New ransomware demands payment in iTunes, targets older Android software

New ransomware demands payment in iTunes, targets older Android software

A new malware type has been spotted that utilizes a couple of original moves not seen yet by researchers; it is self installing and the cybercriminals require that the ransom be paid in iTunes gift cards.

'Bored' Filipino IT experts to be hired as white-hat hackers

In order to better improve and ensure cyber-security of government websites, Philippine senator Ralph Recto plans to recruit "bored" Filipino hackers to serve as "cyber-commandos".

Smart cities still dumb enough to be hacked

Smart cities still dumb enough to be hacked

The root of the problem with malicious smart city hacking lies in the fact that sensors typically collect 'raw' data and then merely pass it on.

Clapper unhappy that Snowden sped up encryption by 7 years

Clapper unhappy that Snowden sped up encryption by 7 years

James Clapper, director of national intelligence has blamed the NSA whistleblower Edward Snowden for making it harder for the US to monitor and arrest terrorists by advancing the development of more advanced and widely available encryption.

Report: Ransomware feeds off poor endpoint security

Report: Ransomware feeds off poor endpoint security

Poor endpoint security practices are propelling the great ransomware epidemic of 2016 — and if allowed to fester, the threat will spread to new endpoints including IoT devices, cars and ICS and SCADA systems, a new report said.

Clapper: U.S. mulling ways to disclose info on Americans caught up in gov't spy net

Clapper: U.S. mulling ways to disclose info on Americans caught up in gov't spy net

The U.S. government is mulling ways it might disclose the number of Americans who have been caught up in government surveillance under the Prism program, set to expire in 2017.

Was Spotify breached? Account info shows up on Pastebin

Was Spotify breached? Account info shows up on Pastebin

Spotify may have experienced a security breach based on a list of customer account credentials discovered on Pastebin.

GozNym banking malware spotted now in Europe

GozNym banking malware spotted now in Europe

IBM's X-Force reported today the actors behind the hybrid GozNym banking trojan that stole $4 million from U.S. banks in March have released a new configuration that is targeting European banks.

One in three Americans resort to risky behaviors to remember passwords, study

One in three Americans resort to risky behaviors to remember passwords, study

A recent SecureAuth study found one in three Americans resort to risky behaviors to remember passwords.

Justice drops case against Apple after cracking iPhone in Brooklyn investigation

Justice drops case against Apple after cracking iPhone in Brooklyn investigation

The Justice Department told a federal court that it was dropping its case against the tech giant after it received a passcode for the device from an unnamed source.

Researcher finds backdoor that accessed Facebook employee passwords

Researcher finds backdoor that accessed Facebook employee passwords

A Taiwan-based security researcher, known as "Orange Tsai, who was awarded a $10,000 bug bounty in February, published a report detailing the exploits that led to his discovery of illicit code on a Facebook server.

Cybersecurity Caucus: FDA guidelines protect medical devices from hackers

Cybersecurity Caucus: FDA guidelines protect medical devices from hackers

Rep. James Langevin wrote an open letter to the Food and Drug Administration's (FDA) praising draft guidance that would strengthen the cybersecurity of medical devices.

Government requests to Apple for customer data drop

Government requests to Apple for customer data drop

Germany, the United States and Australia were not shy when it came to asking Apple for customer information filing thousands of requests in the second half of 2015.

Hong Kong democracy activists targeted by Poison Ivy variant

Hong Kong democracy activists targeted by Poison Ivy variant

Pro-democracy activists in Hong Kong are being targeted by a new variant of Poison Ivy, a malware package that previously hadn't seen an update in six or seven years.

Hacked filipino voter records made public

Hacked filipino voter records made public

Filipino voting records which were breached earlier this month have now been made public and searchable.

SpyEye authors headed to prison

SpyEye authors headed to prison

The two men responsible for the SpyEye banking trojan, used to steal user information from financial institutions, were sentenced to a combined 24-1/2 years in prison.

Records of 93.4M Mexican voter discovered in public database

Records of 93.4M Mexican voter discovered in public database

MacKeeper Security Researcher Chris Vickery claimed to have discovered 93.4 million Mexican voter registration records.

Cyberattacks increase against manufacturing, healthcare industries

Cyberattacks increase against manufacturing, healthcare industries

Report examines the shifting direction of cyberattacks noted attackers turning their attention away from financial services, in favor of attacks against manufacturing and healthcare companies.

Most orgs couldn't quickly detect breach, study

Most orgs couldn't quickly detect breach, study

Researchers at DB Networks and Osterman Research find many orgs lack the proper tools to monitor their data bases.

FIN6 uses legit payment card data, GRABNEW-infected systems to steal info

FIN6 uses legit payment card data, GRABNEW-infected systems to steal info

A new report from FireEye Threat Intelligence said that one case investigated by Mandiant indicated that a victim computer "was originally compromised with GRABNEW malware by a separate threat actor."

Data breach threats keep 51% of biz leaders from sleeping at night

Data breach threats keep 51% of biz leaders from sleeping at night

Over half (51 percent) of senior decision-makers in large businesses are kept awake at night due to the threat of a data breach caused by a cyber-attack.

New technique hides RATs in memory, never touching disk during its execution

New technique hides RATs in memory, never touching disk during its execution

Researchers have discovered a new trick for concealing the installation of RATs, after identifying malware samples that never touch the hard drive throughout execution, remaining in memory until the malware is fully enabled.

South Korea no 1 origin point for DDoS attacks

South Korea no 1 origin point for DDoS attacks

According to a new report by Imperva, South Korea serves as the most prolific point of origin for global DDoS attacks.

Industry groups call Burr-Feinstein encryption bill 'ultimately unworkable'

Industry groups call Burr-Feinstein encryption bill 'ultimately unworkable'

A coalition of industry groups representing some of the largest tech companies in Silicon Valley penned an open letter to Sen. Richard Burr (R-NC) and Sen. Dianne Feinstein (D-Calif.).

Judges tosses evidences in Tor child porn case; rules warrant to spy on users was void

Judges tosses evidences in Tor child porn case; rules warrant to spy on users was void

A federal district court judge has ruled that an Eastern Virginia magistrate overstepped her authority when granting the FBI a warrant to collect data from the user of a child pornography site, because the data resided on a computer in Massachusetts, outside her jurisdiction.

Cybercrime as a business rampant, new study

Cybercrime as a business rampant, new study

Attacks are getting fiercer and attackers more sophisticated and organized, according to the "2016 Trustwave Global Security Report," released this week.

APT spies used malware made for jealous spouses

APT spies used malware made for jealous spouses

Trend Micro has dissected malware used in the Operation C-Major attack officers of the Indian army and tracked it back to malware that originated from Pakistan.

Google's Android Security report shows some Android users left behind

Google's Android Security report shows some Android users left behind

Despite the many efforts Google undertakes to protect its customers from malicious applications, many Android users may remain vulnerable to attack because they're using outdated software.

UPDATE: Hacker taps congressman's cellphone, investigation called for

UPDATE: Hacker taps congressman's cellphone, investigation called for

The best way to encourage the U.S, government to take quick action on a cyber security issue is to anger a congressman.

Nuclear EK targeting users in10K cities worldwide, hides behind porn

Nuclear EK targeting users in10K cities worldwide, hides behind porn

Cisco Talos researchers took a deep dive in the Nuclear EK and found that it was well organized and successful.

Intelligence court affirms FBI's right to search Americans' emails without a warrant

Intelligence court affirms FBI's right to search Americans' emails without a warrant

In a declassified ruling, a federal judge of the Foreign Intelligence Surveillance Court (FISC) ruled that the FBI's search of Americans' emails without a warrant during criminal investigations is not contradictory to the Constitution or the FISA Amendments Act.

Mac researcher tries detecting ransomware generically by spotting behavior patterns

Mac researcher tries detecting ransomware generically by spotting behavior patterns

Less than two months after cybersecurity experts identified KeRanger as the first fully functioning ransomware targeting OS X, an enterprising researcher has chronicled his own attempt at creating a behavior-based ransomware detection tool for Macs.

Microsoft's data portal adds new cloud certifications

Microsoft's data portal adds new cloud certifications

Microsoft is rolling out new certifications provided through the company's data portal.

Oracle shifts to CVSS 3.0, quarterly update contains 136 fixes

Oracle shifts to CVSS 3.0, quarterly update contains 136 fixes

Oracle's quarterly Critical Patch Update was overshadowed this month by the company shifting away from using Common Vulnerability Scoring System (CVSS) version 2.0 to version 3.0.

UPDATE: Wireless mice and keyboards vulnerable to MouseJack takeover

UPDATE: Wireless mice and keyboards vulnerable to MouseJack takeover

Researchers have uncovered a vulnerability in the way non-Bluetooth dongle devices interact with wireless mice and keypads, which could enable a nearby hacker to take over a victim's computer using radio frequency signals.

SC Congress Amsterdam 2016: experts agree, info sharing essential to combatting cyber crime

SC Congress Amsterdam 2016: experts agree, info sharing essential to combatting cyber crime

A panel convened at SC Congress Amsterdam's session on preventing cyber-crime. They agreed that we need to consider the threat, our response and how we might become equally and better organised than our opponents.

SC Congress: Are you ready for the new EU data protection regulation?

SC Congress: Are you ready for the new EU data protection regulation?

When Jamie Randall, CTO of the IASME Consortium, was asked to speak at yesterday's SC Congress Amsterdam on upcoming EU data protection regulation, he says that he, like many people, "promptly fell asleep".

World's largest international cyber-defence exercise underway in Tallinn

World's largest international cyber-defence exercise underway in Tallinn

Some 26 nations and more than 550 computer experts are engaged in the worlds biggest 'live fire' international cyber-defence exercise - Locked Shields.

CCOs fear increased liability from recent compliance changes in Washington

CCOs fear increased liability from recent compliance changes in Washington

Recent changes in Washington have led to CCOs fearing that they may be held personally responsible for the misconduct of their employers.

'Multigrain' variant of POS malware crops up; uses DNS tunneling to steal data

'Multigrain' variant of POS malware crops up; uses DNS tunneling to steal data

A variant of the POS malware family known as NewPosThings, called Multigrain, has introduced a twist into its repertoire—exfiltrating stolen payment card data from POS systems via the Domain Name System (DNS).

Google releases study on infected websites; more than 760K sites compromised annually

Google releases study on infected websites; more than 760K sites compromised annually

Google researchers partnered with a research team from the University of California, Berkeley to analyze the infection and potential remediation of more than 760,000 websites during an 11-month period.

Apple, FBI, square off over encryption during House subcommittee hearing

Apple, FBI, square off over encryption during House subcommittee hearing

Apple and the FBI squared off Tuesday before the Subcommittee on Oversight and Investigation of the House Committee on Energy and Commerce.

DōTERRA breach exposes customer info; including SS, DOB, and addresses

DōTERRA breach exposes customer info; including SS, DOB, and addresses

DōTERRA International notified the State of California's Attorney General's office that personal information of its customers and wholesale members, or "Wellness Advocates," was breached.

Researchers patrolling dark web uncover trojan plot targeting web hosting service

Researchers patrolling dark web uncover trojan plot targeting web hosting service

Web hosting provider Invision Power Services (IPS) was saved from a software compromise that could have potentially damaged its clients after researchers gathered intelligence on a cybercriminal operation taking place on the dark web.

Reveton actors behind new CryptXXX ransomware

Reveton actors behind new CryptXXX ransomware

Proofpoint researchers spotted a previously undocumented ransomware, dubbed CryptXXX, that has been spreading through Bedep after the Angler EK was used to infect computers and is the work of the same group behind Reveton ransomware.

Buffalo buffalo buffalo: malware that attacks malware

Buffalo buffalo buffalo: malware that attacks malware

When two malware worlds collide: Thanatos malware attacks malware, then attacks your network.

SC Congress Amsterdam 2016 is TODAY!

SC Congress Amsterdam 2016 is TODAY!

SC Congress Amsterdam 2016 opens it's doors today to some of Europe's finest information security practitioners. Check the sessions below and make sure to tweet @scmagazineuk using the #SCAMST hashtag if you have any questions for the speakers!

Python malware slithers its way into European organisations

Python malware slithers its way into European organisations

A strain of malicious code written entirely in Python, dubbed PWOBot, has been discovered infecting a number of organisations based in Europe, specifically in Poland.

Hacker behind Hacking Team breach publishes how-to guide

Hacker behind Hacking Team breach publishes how-to guide

Phineas Fisher, the hacker who claimed responsibility for breaching Hacking Team last year, published a how-to guide detailing his process in executing the attack.

Millennials more likely to store sensitive data on mobile devices, study

Millennials more likely to store sensitive data on mobile devices, study

An Equifax study found millennials were more likely to store sensitive data on their personal devices.

U.S., Russian officials to meet this week on cybersecurity issues, State Dept.

U.S., Russian officials to meet this week on cybersecurity issues, State Dept.

U.S. and Russian officials will meet this week in Geneva to discuss cybersecurity issues though not as a restart of the Bilateral Presidential Commission, a State Department official told SCMagazine.com.

Apple stops patching QuickTime for Windows despite two security flaws

Apple stops patching QuickTime for Windows despite two security flaws

The security flaws in the Windows version of Apple's media player, Quicktime will be left open as Apple announces its intention to stop patching it.

No useful information discovered on San Bernardino iPhone

No useful information discovered on San Bernardino iPhone

The iPhone used by Syed Rizwan Farook, one of the shooters in the San Bernardino terror attack that left 14 people dead, was not found to contain any useful information, according to reports.

Sixth Circuit appeals court: Feds don't need warrant to collect cell location data

Sixth Circuit appeals court: Feds don't need warrant to collect cell location data

A U.S. federal appeals court ruled on Wednesday that the FBI did not violate the Constitution when it collected cell site location information without a probable cause warrant, in order to track the movements of multiple robbery suspects.

'Perfect storm' of ransomware, malvertising and phishing attacks follow 'Celebgate' forum breach

'Perfect storm' of ransomware, malvertising and phishing attacks follow 'Celebgate' forum breach

'Celebgate' forum breach leads to flood of ransomware, phishing attacks and malvertising malware on mobile site

Lawmakers query IRS commissioner on cyber progress

Lawmakers query IRS commissioner on cyber progress

During a House committee hearing on Thursday, legislators questioned Internal Revenue Service Commissioner John Koskinen about measures taken to improve the agency's cybersecurity methods.

The anatomy of a spearphishing scam, or how to steal $100M with a fake email

The anatomy of a spearphishing scam, or how to steal $100M with a fake email

Stealing $100 million from a major U.S. corporation should be hard than setting up a fake email account, but for one cybercriminal enterprise this is all it took.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US