Financial Cyberthreats in 2020
2020 was challenging for everyone: companies, regulators, individuals. Due to the limitations imposed by the epidemiological situation, particular categories of users and businesses were increasingly targeted by cybercriminals. While we were adjusting to remote work and the rest of the new conditions, so were scammers. As a result, 2020 was extremely eventful in terms of digital […] more…Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…EyePyramid and a Lesson on the Perils of Attribution
In the past weeks, information-stealing malware EyePyramid made headlines after it was used to steal 87GB of sensitive data from government offices, private companies and public organizations. More than 100 email domains and 18,000 email accounts were targeted, including those of high-profile victims in Italy, the U.S., Japan and Europe. The natural assumption for many […] more…App Store Flooded with Phony Retail Apps to Kick Off Holiday Season
The holiday season has officially kicked off, which means a number of things for many of us: seasonal cheer, quality time with loved ones, and admittedly for many, lots and lots of shopping. And these days, many of holiday retail sales are happening online. Unfortunately, that also means now more than ever, there’s more holiday-related […] more…Can Internet of Things be the New Frontier for Cyber Extortion?
The Internet of Things (IoT)—the network of devices embedded with capabilities to collect and exchange information—has long been attracting the attention of cybercriminals as it continues to gain momentum in terms of its adoption. Gartner has estimated that more than 20.8 billion IoT devices will be in use by 2020; IoT will be leveraged by […] more…Twitter Drama and What Parents Need to Know
With more teens flocking to social networks outside of Facebook, it’s more important than ever for parents to understand—and coach their kids—through the rapid-moving, drama-filled environment of Twitter. Twitter has become a hot spot for teens, many of whom view Tweets the same way they view texts. They tweet quickly and often. And, sometimes things […] more…More information
- Protecting Against WordPress Brute-Force Attacks
- First large-scale doxing study reveals motivations and targets for cyber bullying
- Driving city government toward improved services (City of Niles, Ohio)
- Researchers improve de-anonymization attacks for websites hiding on Tor
- Arecibo Observatory spots a fast radio burst that keeps on bursting
- Mirai, BrickerBot, Hajime Attack a Common IoT Weakness
- Java exploits seen as huge menace so far this year
- And the Oscar goes to… Cybersecurity!
- Microsoft Patches 4 Vulnerabilities Exploited in the Wild
- Researchers detail SSL implementation holes