Archive

A Microsoft regional director and security developer, Troy Hunt, was contacted early on Tuesday morning by an anonymous person on Twitter who told him he had obtained personal information about him and his wife. “This guy reached out to me

Just last month, researchers explained how an attacker can knock the 911 service offline in an entire state by launching automated Distributed Denial of Service (DDoS) attacks using a botnet of just 6000 smartphones. But, doing so, in reality, could

A student uncovered a security vulnerability in the job placement website of Virgin Media that allegedly exposed “about 30,000 to 50,000” applications featuring personal information such as names, home addresses, email details and telephone numbers. In a blog post published

A SQL database backup was “placed in an insecure environment” by a third party. The Australian Red Cross has apologised after a 1.74GB-sized backup database containing over half-a-million personal details leaked of blood donors. According to security researcher Troy Hunt,

Cellebrite, an Israeli company that specialises in digital forensics, has dominated the market in helping law enforcement access mobile phones. But one apparent reseller of the company’s products is publicly distributing copies of Cellebrite firmware and software for anyone to

Kaspersky Lab announced last week the launch of a new global computer emergency response team (CERT) focusing on industrial control systems (ICS). Through the Kaspersky Lab ICS-CERT, the security firm wants to share its knowledge and experience in securing industrial

A Chinese cybersecurity firm has demonstrated an attack that makes it possible to intercept all calls and SMS text messages on 4G LTE networks. Even scarier, the attack also makes it possible to hijack devices and knock them off the

Earlier last year, security researchers from Google’s Project Zero outlined a way to hijack the computers running Linux by abusing a design flaw in the memory and gaining higher kernel privileges on the system. Now, the same previously found designing

The alleged Russian hacker, who was arrested by the FBI in collaboration with the Czech police, was believed to be the one responsible for massive 2012 data breach at LinkedIn, according to a statement released by LinkedIn. Now, United States

Around 3.25 million debit cards affected by breach of 90 ATMs, prompting card replacement and PIN change. A cybersecurity issue has hit the debit card network in India with a possible compromise of the backend system of ATM operations, thus

Following the success of the “Hack the Pentagon” program, the U.S. Department of Defense has decided to continue to test its websites and networks for cybersecurity vulnerabilities using crowdsourced experts. The DoD announced on Thursday that it awarded a combined

A researcher has disclosed a couple of serious Slack vulnerabilities that could have been exploited to obtain sensitive information and take over user accounts. The vendor patched the flaws and awarded the expert a total of $9,000. According to researcher

SAN FRANCISCO — At least two successive waves of online attacks blocked multiple major websites Friday, at times making it impossible for many users on the East Coast to access Twitter, Spotify, Netflix, Amazon, Tumblr and Reddit. The first attacks

Bad news: A hacker has released source code for malware that can be used to automatically find and hack internet of things devices that use default accounts and passwords, then use them to launch distributed denial-of-service attacks. Numerous Linux-based routers,

TalkTalk has been hit with a record £400,000 fine for the cyber attack in 2015 that exposed personal details of more than 150,000 customers. The new information commissioner, Elizabeth Denham, said the telecoms provider had failed to apply “the most

Businesses in the UK could face up to £122 billion in fines for cybersecurity breaches in 2018, according to new findings from the Payment Card Industry Security Standards Council (PCI). The increase in fines would come as part of new