Author: Jerry

1 457 458 459 460 461 513 3213 / 3590 POSTS
Chinese hackers go after third-party IT suppliers to steal data

Chinese hackers go after third-party IT suppliers to steal data

Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their th ...
Symantec certificate authority issues listed by Mozilla developers

Symantec certificate authority issues listed by Mozilla developers

Mozilla developers posted a summary of 14 separate "confirmed or suspected" issues involving Symantec certificate authorities in order to allow Symant ...
Details Around Romanian Phishing Kit Creator, Campaign Revealed

Details Around Romanian Phishing Kit Creator, Campaign Revealed

Researchers explained how they traced a cybercriminal’s tracks through a series of proxies, compromised web servers, and poorly secured routers. The s ...
Lessons From Top-to-Bottom Compromise of Brazilian Bank

Lessons From Top-to-Bottom Compromise of Brazilian Bank

SINT MAARTEN—For three months starting last October, hackers pulled off a stunning compromise of a Brazilian bank’s operations top-to-bottom. The atta ...

Apple fixes wireless-based remote code execution flaw in iOS

Apple released an iOS update Monday to fix a serious vulnerability that could allow attackers to remotely execute malicious code on the Broadcom Wi-Fi ...
Trump Signs Repeal of ISP Privacy Rules

Trump Signs Repeal of ISP Privacy Rules

President Trump signed congressional legislation late Monday that repeals the Federal Communications Commission’s rules that would of prevented broadb ...
Dual-Use Software Criminal Case Not So Novel

Dual-Use Software Criminal Case Not So Novel

“He built a piece of software. That tool was pirated and abused by hackers. Now the feds want him to pay for the computer crooks’ crimes.” The above s ...
1 457 458 459 460 461 513 3213 / 3590 POSTS