You searched for hackers/ | SC Media

Your search for hackers/ returned 329 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 12 months remove

Your search for hackers/ returned 329 results

Sort Results:

Relevant Recent
Perspectives

Navigating through the mind of a 2020 hacker

When someone gets notified that they have been impacted by a data breach, many people picture a hooded figure in a dark basement with lines of code streaming across a computer screen. Contrary to popular belief, cyberattacks are rarely carried out by a sophisticated cyber-assassin looking to destroy a business. Most of the time they…
Huawei responds to allegations of NSA hacking
APTs/cyberespionage, Mobile Security, Mobile/End Point Security, Security News

Huawei meeting with bug bounty hackers

Huawei, the subject of a U.S. government ban amid allegations that China might force the company to spy on others, will reveal a bug bounty program for its mobile devices and new HarmonyOS operating system, to top phone hackers in Munich during a secret meetup Nov. 16. The tech company is likely trying to convince…
Government, Phishing, Privacy & Compliance News and Analysis, Security News

Twitter hackers accessed direct messages for 36 accounts

The hackers who ran a cryptocurrency scam using high-profile, verified Twitter accounts, including those belonging to Joe Biden, Apple, Bill Gates, Uber and Barack Obama, accessed the direct messages (DMs) of 36 accounts and downloaded account data from eight accounts via “Your Twitter Data.” There is no indication that the DMs of any former or…
Featured, Security News, Vulnerabilities

As tech reaches end of life, hackers are watching

A recent rash of cyberattacks against web commerce sites relying on Adobe's Magento 1 platform underscores the criticality of having a strategy in place for securing technology no longer supported by the vendor.
Database security, Ransomware, Security News

MongoDB hacker threatens to report breach to GDPR

A hacker that uploaded ransom notes on nearly 23,000 MongoDB databases left exposed online without passwords has given his potential victims until tomorrow to pay a $140 ransom, or possibly report the breach to local GDPR authorities. According to recent ZDNet story, the hacker used an automated script to scan for misconfigured MongoDB databases, effectively…
NintendoSwitch
Cybercrime, Gaming, Legal, Legal, Phishing, Security News

Hacker pleads guilty to stealing Nintendo secrets

A California hacker pleaded guilty last Friday in federal court to one count of computer fraud and abuse, for stealing and leaking sensitive information related to the Nintendo Switch gaming console and various Nintendo game titles. Ryan Hernandez, 21, of Palmdale, Calif., also pleaded guilty to one charge of possess of children pornography. A Department…
APTs/cyberespionage, Security News

Russian Turla group masqueraded as Iranian hackers in attacks

The Russian hacker group Turla disguised itself as Iranians and stole state secrets from multiple countries, authorities from the U.S. and U.K. said Monday.  “Identifying those responsible for attacks can be very difficult, but the weight of evidence points towards the Turla group being behind this campaign,” Paul Chichester, director of operations at GCHQ’s National Cyber Security…
Data Breach, Featured, Malware, Phishing, Security News

Hackers hijack design platform to go phishing

Australian design platform Canva unwittingly provided phishing campaigns with graphics, making threat actors’ schemes appear more legitimate as they pilfer credentials through social engineering trickery.
Apple Store
Mobile Security, Research, Security News, Vulnerabilities

Apple to send research phones to trusted hackers

Apple on Wednesday officially launched its iOS Security Research Device (SRD) program — a significant milestone for the white-hat hacker community, which has made significant strides in recent years gaining the trust of software developers, tech manufacturers and website operators that previously were reluctant to work with outsiders on security issues. Under the terms of…
Next post in Mobile Security