A man was sentenced to 20 years in prison after giving a new meaning to the term domain-hijacking when attempting to forcibly steal a domain name from someone at gunpoint.
The keynote speaker at yesterday's Reset 2018 was Kim Zetter, an investigative journalist and author of an acclaimed book on Stuxnet (Countdown to Zero Day: Stuxnet and the launch of the world's first digital weapon).
The incident was reported on May 22 after the intrusion was "detected and contained quickly."
With nearly half the world watching, odds are several security professionals will be looking to sneak a peak of the game which could be bad for the security of your business.
The statement came from a Department of Energy government research laboratory focusing on the lab's findings around aviation cybersecurity and was included in government internal presentations and risk assessments.
The campaign dubbed Operation Prowli was observed targeting vulnerable platforms, including CMS servers, backup servers, DSL modems and IOT devices to mine cryptocurrency, promote fake websites and run tech support scams,
The attack wiped out the city police department's dashcam footage archive, which could compromise DUI cases and has already left a Police Department investigator unable to produce a critical piece of evidence during testimony.
Buffalo Wild Wings apologized for a series of racist and vulgar tweets sent from its Twitter account which appears to have been hacked Friday night.
Recent data breaches, vulnerable voting machines, inconsistent security practices a complex decentralized election system provide several attack vectors for attackers looking to influence elections.
The company didn't specify whether or not user information has been compromised but did acknowledge the incident in a tweet.
Schneider Electric CISO Tony Parrillo and Aon Risk Solutions Senior Vice President James C. Trainor discussed cyber insurance at SC Media's RiskSec.
Major vulnerabilities in the EOS blockchain and smart contracts platform may push back the Mainnet launch scheduled for June 2.
Cybercriminals on average have a week to attack before potential victims even know they're vulnerable.
Vulnerability patched in Git source code versioning software. Security researchers have discovered a number of flaws in Git that could have enabled hackers to run remote code on a victim's PC.
More than 1,000 owners of Wi-Fi routers were left exposed to potential cyber-attacks after Singapore Telecommunications Limited forgot to secure port 10000 in its Wi-Fi gigabit router devices.
Hackers may have stolen bank data from 90,0000 Canadian customers
New tools and techniques used by the Confucius cybergangs suggest further connections between the group and the Patchwork cybergang.
LifeBridge Health is notifying 500,000 patients that their personal information was exposed in a data breach.
Comic-book writer Stan Lee appears to have sent a beacon to assemble his fans and Mark Zuckerberg after discovering his Instagram and Facebook accounts were hacked.
The second campaign from the "Sun Team" hacking group managed to sneak its way into the Google Play Store that actively targeted North Korean defectors.
Ruslans Bondars, 37, a of the former USSR who had been residing in Riga, Latvia, Wednesday was convicted of one count of conspiracy to violate the Computer Fraud and Abuse Act, one count of conspiracy to commit wire fraud, and one count of computer intrusion with intent to cause damage and aiding and abetting.
A zero-day exploiting malware capable of performing credential theft, cryptomining, click fraud, and more has already infected more than 100,000 users from over 100 countries
A woman who pled guilty to hacking into Parris Hilton' bank accounts and iCloud accounts to steal nude photos and over a $100,000 is scheduled for sentencing Monday.
A new ransomware named after a gladiator is demonstrating how even malware with sparse features can get still get wreak havoc on unsuspecting users.
PUBG Corp. announced the arrest of 15 hackers in China who were accused of developing, selling, promoting, and using unauthorized hacking/cheating programs