A group posing as the Armada Collective is threatening businesses with large-scale DDoS attacks without carrying out the attacks. So far, they’ve been paid more than $100,000.
Most alarming is not what’s new in Verizon’s 2016 Data Breach Investigations Report, rather what’s old and still causing chaos behind corporate firewalls.
Researchers at Kaspersky Lab today published a decryptor that recovers files encrypted by the CryptXXX ransomware.
Drive-by exploits install ransomware on outdated Android devices using a stolen Hacking Team exploit and the first weaponized Towelroot attack.
Facebook reports that for the first time in a given 30-day period, more than one million people access the social network over Tor.
The banking malware GozNym has spread into Europe and begun plaguing banking customers in Poland with redirection attacks, IBM said.
Hackers behind the $81 million heist in February at Bangladesh Bank used stolen credentials to access the financial institution’s SWIFT payment system and a malware toolkit to cover their tracks.
The Massachusetts Institute of Technology announced this week that it will launch its own experimental bug bounty program.
Was the Federal Bureau of Investigation justified in paying over $1.3 million for a hacking tool that opened the iPhone 5c of San Bernardino terrorist?
Mike Mimoso and Chris Brook discuss the news of the week, including BlackBerry CEO’s stance on lawful access principles, the FBI/Apple hearing, Viber adding end-to-end crypto, Teslacrypt, and more.