Skimmer acts as payment service provider via rogue iframe

Even e-commerce sites that do not take payment information themselves can be abused by crooks. In this post, we show how a web skimmer is able to inject an artificial iframe into the checkout page to prompt users for their credit card information. Victims will only realize something’s not right when they are redirected to the real (and external) payment form.

Read more

A week in security (May 13 – 19)

A roundup of security news from May 13–19, including ransomware attacks on the upswing, website hacking, pseudo-VPNs, bloatware, and more.

Read more

A week in security (March 25 – 31)

A roundup of news stories from March 25 – 31, including phishing, hacking, Government studies, mobile dangers on official stores and more.

Read more

Are hackers gonna hack anymore? Not if we keep reusing passwords

A look at the not-so-hacking hacker techniques attackers are using to compromise user accounts via weak passwords and gain access to enterprise networks.

Read more

Hacker destroys VFEmail service, wipes backups

A hacker managed to compromise, and entirely destroy, a popular email service and all of its backups. What happened?

Read more

Collection 1 data breach: what you need to know

In what’s being dubbed one of the largest data dumps in history, Collection 1 contains the data of over 770 million people. But is it really as bad as it sounds? We take a closer look and let users know what to do if their info is caught up in the mix.

Read more

Luas data ransom: the hacker who cried wolf?

Irish tram firm Luas were recently compromised and told to pay 1 Bitcoin, or risk user data being fired into the void. The deadline for paying the ransom has now passed: So what happens next? And is anyone out there really at risk?

Read more

All the reasons why cybercriminals want to hack your phone

Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.

Read more

Compromising vital infrastructure: transport and logistics

Transport and logistics are vital infrastructure, because we need them to deliver our daily necessities, but who is responsible for protecting them?

Read more

Tomorrowland festival goers affected by data breach

A data breach from a 2014 Tomorrowland electronic music festival has affected up to 60,000 event-goers caught up in the action.

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language