Security vulnerabilities in millions of Internet of Things (IoT) devices, including connected security cameras, smart baby monitors and other digital video recording equipment, could allow cyber attac...
Ransomware is a growing threat to every organization on the planet and cyber-criminals are innovating at a phenomenal pace because they have the funds to do so. In fact, many cyber-criminal groups have more fun...
Not all teenagers are sneaking out in the middle of the night, one is sneaking into nearly 800,000 open FTP servers. The story begins with a security researcher, Minxomat, scanning IPv4 addresses to find nearly...
Researchers claim that ransomware campaigns are usually willing to negotiate these days. “Cybersecurity firm F-Secure released a new report, “Evaluating the Customer Journey of Crypto-Ransomware and...
1. Search for the telltale signs of a breach. Port Scans? Excessive failed log-ins? When a hacker infiltrates an unfamiliar network they need to learn the topology of the network, looking for vulnerable points...
Jani, the 10 year old that found a bug in Instagram, probably didn’t know you technically have to be 13 years old in order to even have an Instagram account. You may have to be 13 to have an account but t...