Please turn on your JavaScript for this page to function normally.
Danger
Ransomware’s lucrative next stop? The Point of Sale

With the influx of credit card breaches over the past few years at major brands, hackers may have reached a point of supply exceeding demand, as awareness of breaches, …

flame
Five key trends to watch in 2018 as cybercriminals continue to innovate

The McAfee Labs 2018 Threats Predictions Report identifies five key trends to watch in 2018. This year’s report focuses on the evolution of ransomware from traditional to new …

Android
Tizi backdoor rooted Android devices by exploiting old vulnerabilities

Google has discovered and removed from Google Play a number of apps that contained the Tizi backdoor, which installs spyware to steal sensitive data from popular social media …

danger
A look at the top seven ransomware attacks in the past decade

In part one of this series, we discussed exactly what ransomware is, including the effects of and motives behind different types of attacks. In this second article, I’ll look …

Sacramento Regional Transit Bus
Hackers hit Sacramento transit system, demand money to stop attack

Hackers looking for a payout have hit the Sacramento Regional Transit (SacRT) system, defacing the agency website, erasing data from some of its servers, and demanding money …

tech support scam
New scam launches users’ default phone app, points it to fake tech support hotline

The latest variants of tech support scams targeting Apple users have done away with the usual visually prominent error messages. Instead, they open the potential …

shopping
Identity theft concerns won’t hold back holiday shopping

Despite concerns about identity theft and fraud, consumers don’t plan to curb their holiday shopping, according to Discover. While 62 percent of consumers are very or …

DDoS
Criminals leverage unsecured IoT devices, DDoS attacks surge

Organizations experienced an average of 237 DDoS attack attempts per month during Q3 2017 – equivalent to 8 DDoS attack attempts every day – as hackers strive to take their …

phishing
The long tail of phishing attacks

Targeted phishing has become the single most effective attack type in the world today. Phishing attacks have been the root cause of the majority of the large-scale data …

iPhone 8
The tools criminals use to prepare a stolen iPhone for resale

Reselling stolen mobile phones is a lucrative business all over the globe, and iPhones are very much in demand. Whether lost or stolen, the iPhones are often locked by their …

ransomware
Rise and evolution of ransomware attacks

Ransomware, malware that encrypts systems and then asks for a ransom to decrypt files and systems, has become more prevalent in recent years. In fact, two of 2017’s major …

skull
IcedID: Original new banking Trojan emerges

IcedID, a new banking Trojan that does not seem to have borrowed code from other similar threats, has entered the financial cybercrime arena. It was first spotted in the wild …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools