Tag "Hackers"

Back to homepage
Hardware/Network

DDoS Attacks Nearly Double Since January

Organizations experienced an average of 237 DDoS attack attempts per month during the third quarter (equivalent to eight DDoS attack attempts every day), which represents a 35% increase in monthly

Vendor News

Global Cyber Alliance launched the Quad9 DNS service to secure your online experience

The Global Cyber Alliance (GCA) has launched the Quad9 DNS service (9.9.9.9), a new free Domain Name Service resolver that will check user’s requests against the IBM X-Force’s threat intelligence

Identity Theft

Cash Converters Data Breach

News has just surfaced that Cash Converters has been hit by a data breach. The company reported that it had:“Received an email threat from a third party claiming to have

Software

Why hackers reuse malware

Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is that most new

Software

What motivates bug hunters?

Crowdsourced security penetration testing outfit Bugcrowd has released its second annual “Mind of a Hacker” report, to provide insight into bug hunters’ motivations and preferences, and help companies tailor their

Industry Insights

Lastline Reveals Predictions and Trends For the 2018 Cyberthreat Landscape

By Noe Sacoco Jr -PM director at Lastline, Company predicts continued rise in cybercrime will be met with advances in artificial intelligence and machine learning as emerging methods to counteract

Identity Theft

US retailer Forever 21 Warns customers of a payment card breach at some locations

Another data breach made the headlines, this time the victim is the US clothes retailer Forever 21 that announced it has suffered a security breach.According to the company, unknown hackers

Industry Insights

Vectra 2018 Cyber Security predictions

Ransomware as a disruptive or destructive attack will increase. Cyber warcraft is the new oil – in essence, total control of corporate networks or industrial plants have become as valuable

Mobile

The tools criminals use to prepare a stolen iPhone for resale

Reselling stolen mobile phones is a lucrative business all over the globe, and iPhones are very much in demand.Whether lost or stolen, the iPhones are often locked by their legitimate

Identity Theft

New Report: 30% of CEO Emails Exposed in Breaches

The phrase “new normal” usually offers little comfort — particularly when stolen secrets are in the mix.It’s true. Data breaches have become so commonplace that we’re nearly numb to them.