In the wake of COVID-19, data theft is by far the top tactic, followed by cryptomining and ransomware.
Read moreSurvey of Supply Chain Attacks
July 28 2020The Atlantic Council has a released a report that looks at the history of computer supply chain attacks. Key trends from their summary: Deep Impact from State Actors: There...
Read moreBusiness ID Theft Soars Amid COVID Closures
July 27 2020Identity thieves who specialize in running up unauthorized lines of credit in the names of small businesses are having a field day with all of the closures and economic...
Read moreShinyHunters Offers Stolen Data on Dark Web
July 27 2020The threat actor offers more than 26 million records from a series of data breaches.
Read moreTwo companies have teamed up to rate open source projects, but can adopting repository ratings help developers make better decisions regarding open source?
Read moreImages in Eye Reflections
July 27 2020In Japan, a cyberstalker located his victim by enhancing the reflections in her eye, and using that information to establish a location. Reminds me of the image enhancement scene...
Read moreHow stolen credentials for services like Zoom and password reuse practices threaten to compromise other accounts and applications.
Read moreRansomware crooks keep adjusting their approach to make their demands more compelling, even against companies that say they'd never pay up.
Read moreBlock/Allow: The Changing Face of Hacker Linguistics
July 27 2020Terms such as "whitelist," "blacklist," "master," and "slave" are being scrutinized again and by a wider range of tech companies than ever before.
Read moreMonday review – our recent stories revisited
July 27 2020Our most recent articles and videos, all in one place.
Read more
Recent Comments