Transport and logistics are vital infrastructure, because we need them to deliver our daily necessities, but who is responsible for protecting them?
A data breach from a 2014 Tomorrowland electronic music festival has affected up to 60,000 event-goers caught up in the action.
The World Cup is in full swing, and attackers are busy both on and off the pitch. Which of the competing nations are under fire from malware authors? Who is sailing through qualifying rounds mostly untouched? What are the most popular threats in the midst of the biggest footballing nations? Read on to find out.
Many people post unredacted medical images to Twitter and Instagram. They shouldn’t because the details included on the image often can compromise personal identity online and in rare instances, lead to a possible attack on an exposed piece of medical IT infrastructure.
GameStop confirmed with KrebsOnSecurity that they are currently investigating reports of hackers breaching their network and siphoning customer information.
ShadowBrokers finally made good on their promise to release the decryption key to unlock the stolen ‘auction’ file purportedly filled with NSA hacking tools.
Video games! They’re great, except when they’re not. And in this case, a very good game is giving players some very bad experiences in the realm of “all my data is ruined”. Gaming cheats cause problems for those wanting to keep their save games free from harm. We take a look at the issue, and show how to avoid getting caught up in a spot of save game ruination.
Phishing URL compromise is surprisingly common, as many phish pages are fully expected to have a short shelf life. Of course, having a site taken down isn’t the only thing making life difficult for phishers. As you’ll see, it’s often the least of their worries given the surprisingly plentiful ways people want to celebrate International Give a Phisher a Headache Day.
A compromised nude leak forum, dubious adverts, Malvertising, Ransomware and more besides – this one has it all.