January 26, 2018 - Until a recent fix was applied, users of the VR pornography app SinVR could have found their subscriber information up for grabs.
January 12, 2018 - A 28-year-old Ohio programmer is charged with creating the Fruitfly malware to spy on thousands of unsuspecting victims and produce child pornography.
December 21, 2017 - This year saw a handful of spectacularly bad security fails that resulted in massive sets of compromised data. Here are the most colossal data breaches of 2017.
December 6, 2017 - Internet of Things technology may soon multiply in the billions. But security for these devices is practically non-existent. What needs to be done to secure IoT users now and in the future?
September 8, 2017 - On July 29, 2017, Equifax discovered that attackers had gained unauthorized access to private data belonging to an estimated 143 million Americans by exploiting a vulnerability in a website application.
April 14, 2017 - ShadowBrokers shocked the security world again today by releasing another cache of exploits, files, and operational documents purportedly stolen from Equation Group last summer. As you may recall from our earlier publications, Equation Group is reportedly a clandestine hacking group that has been linked with NSA hacking tools.
April 10, 2017 - GameStop confirmed with KrebsOnSecurity that they are currently investigating reports of hackers breaching their network and siphoning customer information.
April 10, 2017 - ShadowBrokers finally made good on their promise to release the decryption key to unlock the stolen 'auction' file purportedly filled with NSA hacking tools.
April 8, 2017 - The common conception of cyber attacks is kind of like bad weather: ranging from irritating to catastrophic, but always unpredictable. Hackers are simply too sophisticated to draw any reliable judgments on and we shouldn’t try. As it turns out, some hackers are fairly predictable in their successful use of really dumb attacks.
October 25, 2016 - Over the years we’ve done analysis on tech support scammers to include their tactics, infrastructure, front companies, payment mechanisms, and even how they hire. But one question that comes up frequently from security researchers is how a group of criminals, who are by most accounts computer illiterate, set up tech support scams that require a hard minimum of technical expertise, troubleshooting, and maintenance?