“We have fallen victim to an internet-based crime that has defrauded our taxpayers of $2.3m,” reads an August 23 press release put out by the Town Administrator of Peterborough, New Hampshire. It continues, “We do not believe that the funds…
Earlier this month, a hacker pointed out a security vulnerability in the German Christian Democratic Union (CDU) political party’s election campaign app. The party responded by pressing charges against the hacker. The complaint has since be…
Shopping cart malware, known as Magecart, is once again making headlines while plying its criminality across numerous ecommerce sites. Its name is in dishonor of two actions: shopping carts, and more specifically, those that make use of the…
Apple’s Tim Cook, Microsoft’s Satya Nadella, and Amazon’s Andy Jassy are among a group of tech CEOs that were called to a White House meeting Wednesday by President Joe Biden. The point of the gathering was to discuss efforts by private com…
T-Mobile recently had a data breach which resulted in 47 million people’s data being leaked online. Much of that data was collected with user consent when they signed up for cellular phone service, but that’s not always the case in a data b…
Most of us are familiar with the primary methods for moving data into and off of our computers: think Wi-Fi networks, USB ports, and Bluetooth connections. However, there are additional, lesser known ways in which data can be retrieved from…
In a bulletin posted on its site, healthcare facility network Memorial Health System, based in West Virginia and Ohio, said it was beginning the process of recovery and restoration after being hit with a ransomware attack earlier in the wee…
Researchers at Ben-Gurion University of the Negev published a paper this week in which they outline how a passive form of the TEMPEST attack, called Glowworm, can reconstruct the sound passing through a computer’s speakers by analyzing the …
Over the past year, we’ve seen a new trend emerge among cyber threats: Professional Channel Attacks. In the past, you only had to worry about your personal email and social channel security. Now attackers are creating elaborate schemes to s…
Over the past year, we’ve seen a new trend emerge among cyber threats: Professional Channel Attacks. In the past, you only had to worry about your personal email and social channel security. Now attackers are creating elaborate schemes to s…