Hacking

Hackers snab emails and more in Microsoft Outlook, Hotmail, and MSN compromise - Hackers made use of a compromised Microsoft support agent's credentials to sneak a peek at its users' Hotmail, MSN, and Outlook emails. How bad is it, and what has Microsoft done to correct it?
Are hackers gonna hack anymore? Not if we keep reusing passwords - A look at the not-so-hacking hacker techniques attackers are using to compromise user accounts via weak passwords and gain access to enterprise networks.
Spectre, Google, and the Universal Read Gadget - A recently released paper by Google has resurrected the spirit of Spectre, a seemingly never-ending threat to most makes of processor. We take a look at what this means, and what the Universal Read Gadget means for most technology users.
Hacker destroys VFEmail service, wipes backups - A hacker managed to compromise, and entirely destroy, a popular email service and all of its backups. What happened?
The Advanced Persistent Threat files: APT10 - While security companies are getting good at analyzing the tactics of nation-state threat actors, they still struggle with placing these actions in context and making solid risk assessments. So in this series, we're going to take a look at a few APT groups, and see how they fit into the larger threat landscape—starting with APT10.
Luas data ransom: the hacker who cried wolf? - Irish tram firm Luas were recently compromised and told to pay 1 Bitcoin, or risk user data being fired into the void. The deadline for paying the ransom has now passed: So what happens next? And is anyone out there really at risk?
Assessing the security of a portable router: a look inside its hardware, part deux - In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.
Compromising vital infrastructure: how voting machines and elections are vulnerable - What are our options for secure and honest election results? Should we be using voting machines or are there better alternatives?
Bloomberg blunder highlights supply chain risks - A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true—and what, if anything, can be done to stop it.

Select your language