Code.org Flaw Exposes Volunteer Email Addresses
Code.org, a non-profit organization that helps students learn computer science, informed users over the weekend that a flaw on its website allowed unauthorized parties to access the email addresses of its volunteers. read more Incoming search termsteercot more…Code.org volunteer emails exposed in information leak
As a result, a Singaporean firm decided to try and poach a few members. more…Code.org Hacked, Emails and Locations Data of Volunteers Compromised 33
An anonymous reader allegedly quoting an email from Code.org, claims that the database of the non-profit organization has been breached: Tags: Security more…Steer Clear of the “Pay Yourself Scam” That’s Targeting Online Bank Accounts
An old banking scam has a new look. And it’s making the rounds again. Recently Bank of America alerted its customers of the “Pay Yourself Scam,” where scammers use phony fraud alerts and trick their victims into giving them access to their online banking accounts. It’s a form of phishing attack, and according to Bank […] more…Don’t Take the Bait! How to Steer Clear of Tax Time Scams
For cybercriminals tax time is the most wonderful time of the year. They are in the shadows giddy, eager, and methodically setting a variety of digital traps knowing that enough taxpayers take the bait to render their efforts worthwhile. Indeed, with the frenzy of online tax filings, personal information (and money) moving through mailboxes, and […] more…Tor Project says it can quickly catch spying code
The Tor Project is fortifying its software so that it can quickly detect if its network is tampered with for surveillance purposes, a top developer for the volunteer project wrote on Monday. There are worries that Tor could either be technically subverted or subject to court orders, which could force the project to turn over […] more…Source code for powerful Android banking malware is leaked
The source code for a powerful Android malware program that steals online banking credentials has been leaked, according to researchers with IBM. The malware family is known by several names, including GM Bot, Slempo, Bankosy, Acecard, Slempo and MazarBot. GM Bot has been sold on underground hacking forums for around US$500. But it appears someone […] more…How Safe is Your Android Pin Code? A New Robot Can Easily Break In
By now, many smartphone users know that a first step to securing their mobile data is to lock their phones with some sort of passcode, the most common method being the four-digit PIN. Admittedly, a PIN code seems pretty safe and practically impossible for a human to break—considering the time it would take to manually […] more…A better reason not to use Huawei routers: Code from the ’90s
Security researcher Felix "FX" Lindner has a more compelling reason to steer clear of routers from Huawei Technologies than fears about its ownership. read more Incoming search termsTeer celog more…Why the axios supply chain attack should have Apple worried
The recent supply-chain attack against axios, a widely used open-source HTTP client, highlights a strategic weakness in the global technology stack: critical digital infrastructure is increasingly maintained by under‑resourced individuals, and its failure has systemic economic and national security consequences — even for tech giants like Apple. At the center of your code Axios is a programming library […] more…Exploit available for new Chrome zero-day vulnerability, says Google
Threat actors now have the ability to exploit a new zero-day vulnerability in the Chrome browser, Google has advised IT administrators. The warning comes after Google released a patch for Chrome to plug a use after free memory vulnerability (CVE-2026-2441) in cascading style sheets (CSS), which means the browser’s CSS engine isn’t properly managing memory […] more…22 tech luminaries we lost in 2025
As modern technologies such as artificial intelligence grab today’s headlines, it’s worth remembering that their foundations were being laid more than half a century ago by computer scientists, philosophers, psychologists, developers, entrepreneurs, and more. These pioneers and those who followed tackled issues and solved problems that future generations may never know existed — but without their […] more…Buyer’s guide: How to choose the right business laptops
With hundreds of business-oriented laptops to choose from, picking the right ones to outfit your company’s workforce can be daunting. We’re here to help with a buyer’s guide that breaks the options into categories and provides details, price estimates, and pros and cons of each. Ranging from $200 for the cheapest budget models to nearly […] more…The AI-powered cyberattack era is here
Prognosticators have been prognosticating for 20 years about a future in which hackers use AI to breach networks, steal data, and socially engineer credulous employees. And like so many AI-related futurisms in the age of LLM-based generative AI, this prediction is coming true. Anthropic reported last week that a hacker used its technology for an […] more…‘Tis the Season for Holiday Scams
This time of year, the air not only gets chillier but a bit cheerier for everyone … including online scammers. Holiday scams are a quick way to make a buck, and cybercriminals employ several holiday-themed schemes to weasel money and personally identifiable information (PII) from gift givers. Here are three common holiday scams to watch […] more…Threat Hunting with VirusTotal
We recently conducted our first “Hunting with VirusTotal” open training session, providing some ideas on how to use VT Intelligence to hunt for in-the-wild examples of modern malware and infamous APT campaigns. In case you missed it, here you can find the video recording available on Brighttalk. We also created a PDF version of the […] more…More information
- Passkeys Now Fully Supported in Google Chrome
- Don’t bother signing up for the giant water slide Facebook events
- China-Linked Group Uses New Malware in Japan Attacks
- Israel Says Hackers Targeted SCADA Systems at Water Facilities
- Hackers Invited to Target VMware at Pwn2Own 2016
- I Could Have Hacked All Uber Accounts- But I Chose to Report it Instead
- Update: PSU Job sites experiencing login issues
- Android vs Windows: Now the battle for the desktop really begins
- Tor Browser 4.5 delivers refreshed UI, privacy silder and Windows shortcut
- Major security alert as 40,000 MongoDB databases left unsecured on the internet