What’s The Problem With Backdoor Encryption?
by Emily Newton People will always be interested in keeping their data private. It’s a primary driver for tech companies, but solutions sometimes come with…
by Emily Newton People will always be interested in keeping their data private. It’s a primary driver for tech companies, but solutions sometimes come with…
Recently, the Wall Street Journal reported that in the early months of this year, a Chinese spy balloon utilized American technology to effectively collect audio-visual…
Jul 01, 2023Ravie LakshmananWebsite Security / Cyber Threat As many as 200,000 WordPress websites are at risk of ongoing attacks exploiting a critical unpatched security…
In an attempt to reset the student’s passwords after a mistake in a cybersecurity audit, the Oak Park and River Forest (OPRF) High School reset…
Jul 01, 2023Ravie LakshmananEndpoint Security / Malware Researchers have pulled back the curtain on an updated version of an Apple macOS malware called Rustbucket that…
The Cl0p ransomware gang has claimed a cyber attack on FIS Global. FIS, a leading provider of technology solutions for the financial industry, allegedly fell…
The internet is great for bringing people together, but it can also be a nasty place. Here are some tips to help keep you as…
Stalkerware-type app LetMeSpy has been hacked, with the attacker taking user data with it, the service has announced. Stalkerware-type app LetMeSpy says it has been…
We take a look at a bogus Amazon podcast listing which promises free streams of Evil Dead Rise. Scammers are using a novel technique with…
We take a look at research which claims a way to bypass voice recognition security by stripping synthetic aspects out of fake recordings. Voice authentication…
Proxyjacking is a cybercrime where your bandwidth is sold by criminals. A researcher at Akamai has posted a blog about a worrying new trend—proxyjacking—where criminals…