A look at the not-so-hacking hacker techniques attackers are using to compromise user accounts via weak passwords and gain access to enterprise networks.
In what’s being dubbed one of the largest data dumps in history, Collection 1 contains the data of over 770 million people. But is it really as bad as it sounds? We take a closer look and let users know what to do if their info is caught up in the mix.
Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.
Transport and logistics are vital infrastructure, because we need them to deliver our daily necessities, but who is responsible for protecting them?
A data breach from a 2014 Tomorrowland electronic music festival has affected up to 60,000 event-goers caught up in the action.
The World Cup is in full swing, and attackers are busy both on and off the pitch. Which of the competing nations are under fire from malware authors? Who is sailing through qualifying rounds mostly untouched? What are the most popular threats in the midst of the biggest footballing nations? Read on to find out.
Many people post unredacted medical images to Twitter and Instagram. They shouldn’t because the details included on the image often can compromise personal identity online and in rare instances, lead to a possible attack on an exposed piece of medical IT infrastructure.
GameStop confirmed with KrebsOnSecurity that they are currently investigating reports of hackers breaching their network and siphoning customer information.