Child’s play
A disturbing new trend is emerging from the dark web underworld. Cybercriminals are now using the personal data of children to set up credit lines and perpetrate identity theft. Because children naturally have fresh, unblemished credit, t…
ICE skates around privacy
The American Civil Liberties Union (ACLU) issued grave concerns this week over the recent revelation that the US Immigrations and Customs Enforcement (ICE) holds a $6.1M contract with Vigilant Solutions, an automatic licence…
New platforms to clobber cybercrime
Two major announcements at this week’s RSA mark strident leaps forward in cybersecurity, and both rely on the same core principal — sharing knowledge. The combined efforts that make these cybersecurity tools so pote…
Beware this ransomware adware
Pursuing information on a malicious encryptor, cybersecurity researchers stumbled upon a ransomware/adware bundle scheme. Several seedy online shops selling “cracked” software — that is, software that has been hacked and …
Amazon Ring shares customer videos
Ring has caught on with homeowners everywhere, and the doorbell camera is a common sight on doorsteps across the country, which is why Amazon purchased the company for one billion dollars. But Ring has been criticize…
Crowdfunding for evil
The hacker or cybergang calling itself The Dark Overlord has started the new year on a dark note, announcing Wednesday that it is crowdfunding the release of sensitive legal documents linked to the 9/11 attack, which it claims to…
Emotet malware becomes more versatile; mass harvests emails
Emotet malware, which is usually identified as a banking trojan, is now becoming more versatile and has created a new means for stealing victims’ emails, going back as far as six months. Th…
North Carolina water utility shut down by ransomware
Hurricane Michael, Florence, and now this. It seems North Carolina just can’t catch a break as one of its major water utilities went offline following a ransomware attack. The Onslow Water and Sewer…
Not a pretty picture: A current threat actively terrorizing Instagram users is shutting down high-profile accounts. A recent string of cyberattacks targeting popular influencers — some with over 100,000 followers — have account-holders alarmed while th…
Microsoft included Remote Desktop Protocol (RDP) with its offerings for the first time in 1996. Since then, cybercriminals have been trying, sometimes with success, to hack into machines via this protocol and we’ve seen countless RDP attacks done by di…