Over the past week, scammers are now utilizing a new extortion email campaign that claims the recipient's phone was hacked, includes a partial phone number of the recipient, and further states that they created videos using the recipient's webcam. It then demands $1K USD in bitcoins or the hacker will release the video & other info.
Cisco, one of the world's largest vendor of networking equipment, released security updates today to patch a vulnerability in the IOS and IOS XE operating systems that run the vast majority of its devices.
Dropbox has announced that starting on November 7th 2018, only the ext4 filesystem will beÂ supported in Linux for synchronizing folders in the Dropbox desktop app. Those Linux users who have synch on other filesystems such asÂ XFS, ext2, ext3,Â ZFS, and many others will no longer have working Dropbox synchronization after this date.
Two recently discovered vulnerabilities in the fax protocol can transform fax machines into entry points for hackers into corporate networks, two Check Point researchers revealed last week in a talk given at the DEF CON 26 security conference held in Las Vegas.
Some of the most popular Android applications installed on your phone may be vulnerable to a new type of attack named "Man-in-the-Disk" that can grant a third-party app the ability to crash them and/or run malicious code.
At the DEF CON 26 security conference held in Las Vegas last week, a security researcher detailed a backdoor mechanism in x86-based VIA C3 processors, a CPU family produced and sold between 2001 and 2003 by Taiwan-based VIA Technologies Inc.
Last week, at the DEF CON security conference held in Las Vegas, security researchers presented details about 47 vulnerabilities in the firmware and default apps of 25 Android smartphone models, 11 of which are also sold in the US.
Attackers are targeting DLink DSL modem routers in Brazil and exploiting them to change the DNS settings to a DNS server under the attacker's control. This then allows them to redirect users attempting to connect to their online banksÂ to fake banking websites that steal the user's account information.
This was a pretty quiet week with mostly small variants, one new active release, and a large organization getting hit. This article outlines what new ransomware has been released and other ransomware related stories.
Have you ever heard the saying "If it's too good to be true, then it probably is." If so, then it applies perfectly to programs that claim they can help you cheat in Fortnite or earn free V-Bucks. In this article we take a look at 5 malware samples that pretend to be Fortnite cheats, hacks, or tools.
After Facebook revealed that users' data was collected without their consent and used for political campaigns, more and more people across the world started looking for a secure medium to communicate. Today, Criptext, an independent company, announced a new email app which is hyper-secure and cares about your privacy.
Security researchers have analyzed malware samples from threat actors associated with North Korea and discovered connections with tools from olderÂ unattributed campaigns.
According to reports, computers at the PGA have been infected with ransomware. The victims learned they were infected on Tuesday when ransom notes started appearing on their screen.
Researchers from CheckPoint have figured out a way to manipulate conversations in order to modify existing replies that were received, quoting a message so it appears that it came from another user who may not be part of the group, and sending private messages that can be seen by only one person in a group.
A threat actor named DarkHydrus that is relatively new to the scene reliesÂ on open-source tools for spear-phishing attacks designed to steal credentials from government and educational institutions in the Middle East.
A recent Windows 10 Insider Feedback Hub quest revealedÂ that Microsoft is developing a new throwaway sandboxed desktop feature called "InPrivate Desktop". This feature will allow administratorsÂ to run untrusted executables in a secure sandbox without fear that it can make any changes to the operating system or system's files.