Can Internet of Things be the New Frontier for Cyber Extortion?
The Internet of Things (IoT)—the network of devices embedded with capabilities to collect and exchange information—has long been attracting the attention of cybercriminals as it continues to gain momentum in terms of its adoption. Gartner has estimated that more than 20.8 billion IoT devices will be in use by 2020; IoT will be leveraged by […] more…FIN6 Compromised E-commerce Platform via Magecart to Inject Credit Card Skimmers Into Thousands of Online Shops
We discovered that the online credit card skimming attack known as Magecart or E-Skimming was actively operating on 3,126 online shops. Our data shows that the attack started on September 7, 2019. All of the impacted online shops are hosted on the cloud platform of the e-commerce service provider “Volusion,” one of the top e-commerce […] more…The Top 5 Scariest Mobile Threats
Halloween has to be one of my favorite holidays of the year. Creative costumes, buckets of candy, and pumpkin spice lattes make All Hallows’ Eve a memorable event for people of all ages. But what I love most about Halloween is the traditions associated with it: pumpkin carving, trick or treating and bobbing for apples […] more…RSA Conference 2014: The Way Forward
I attended the RSA 2014 Conference in San Francisco, which has held about two weeks ago. This year the conference offered new insights to today’s threat landscape, which will help us all plan for and protect users in 2014 and beyond. Largest Security Conference of 2014 The attendance numbers for RSA are always impressive: this […] more…Spy? Where? Mobile Spyware Hiding Right Under Your Nose
Some days it feels like the whole world is going mobile. We tweet, we text, we browse the world from small devices that fit into our hands. People from across the globe can reach out to each other with one message. You can buy a plane ticket while on the bus. There are apps that […] more…More information
- Lad who attacked Spamhaus in DDoS attack avoids prison, given a second chance
- FBI might have a way to unlock shooter’s iPhone without Apple’s help
- The Russian government hacked the DNC after all
- TeslaCrypt ransomware now impossible to crack, researchers say
- Iran makes its own anti-virus software – would you buy it?
- Twitter troll fired, another suspended after Curt Schilling names and shames them
- Google Glass isn’t dead. It’s being fine-tuned for the masses
- Resolved: Workflow Termination Forms Problem
- Fortnite hackers making a fortune from reselling stolen accounts
- So-called CNN emails on U.S. bombing Syria lead to exploit kit