hacker

Screen Shot 2021-08-20 at 1.07.19 PM

Critical IoT Security Vulnerability

Security vulnerabilities in millions of Internet of Things (IoT) devices, including connected security cameras, smart baby monitors and other digital video recording equipment, could allow cyber attac...

Screen Shot 2021-08-17 at 2.38.05 PM

How to Prepare for the Growing Threat of Ransomware

Ransomware is a growing threat to every organization on the planet and cyber-criminals are innovating at a phenomenal pace because they have the funds to do so. In fact, many cyber-criminal groups have more fun...

Teenage hacker grabs massive data from 800,000 open FTP servers

Not all teenagers are sneaking out in the middle of the night, one is sneaking into nearly 800,000 open FTP servers. The story begins with a security researcher, Minxomat, scanning IPv4 addresses to find nearly...

Ransomware – Never too late to negotiate

Researchers claim that ransomware campaigns are usually willing to negotiate these days. “Cybersecurity firm F-Secure released a new report, “Evaluating the Customer Journey of Crypto-Ransomware and...

5 Ways to Spy a Hacker in Your Network

1. Search for the telltale signs of a breach.  Port Scans? Excessive failed log-ins? When a hacker infiltrates an unfamiliar network they need to learn the topology of the network, looking for vulnerable points...

10 year old finds Instagram bug and cashes in big

Jani, the 10 year old that found a bug in Instagram, probably didn’t know you technically have to be 13 years old in order to even have an Instagram account. You may have to be 13 to have an account but t...