How the threat experts see it …
A unique survey among threat experts has revealed that most cyberattacks against a typical IT infrastructure take less than 24 hours to plan and execute, and almost half are successful.
A unique survey among threat experts has revealed that most cyberattacks against a typical IT infrastructure take less than 24 hours to plan and execute, and almost half are successful.
The TPP deal is coming and things won’t be easy on the Internet The Trans-Pacific Partnership trade deal was signed by New Zealand trade minister Todd McClay recently in Auckland, putting the TPP a step closer to becoming a reality. The deal has been signed by ministers of all 12 member countries and will now […]
Experts Discover the Dangers of Using apps like ‘Be Like Bill’ Facebook Meme Generator The immensely popular Be Like Facebook Meme generator app isn’t as harmless as it appears to be and if necessary, precautions aren’t undertaken while trying to create a meme, you could expose yourself to possible dangers. For some while, security experts […]
The Dark DDoS threat will not only increase in 2016 but it will also let the cyber criminals earn money in the shape of ransom. A prediction from Corero: A company that is among the leading provider of First Line of Defense Solutions insecurity and attacks by DDoS have predicted that there will be a […]
According a report from the Nuclear Threat Initiative, numerous nations are not prepared’ to handle the cyber attacks focusing on their nuclear facilities. Numerous nations are not “prepared” to handle the cyberattacks focusing on their facilities linked tonuclear programs, as per a recent report from the NTI (Nuclear Threat Initiative). The Nuclear Threat Initiative is a non-fanatic, […]
ESET’s Trends for 2016: (In)Security Everywhere report includes a review of the most important events of last year and outlines trends in cybercriminal activity and cyberthreats for 2016.
It is being reported that the oil and gas sectors have suddenly become more vulnerable to cyber threats. In 2013, we at HackRead reported how oil and gas sector faces serious physical and online security threats. Now, as per the data received by firms belonging to the oil and gas industry, 2015 has been quite […]
A repeat of last year’s gaming outage looks to have been avoided after hacker group Phantom Group claimed it won’t target Sony and Microsoft. Last Christmas, gamers were outraged when both the PlayStation and Xbox networks were taken offline by hackers through a denial of service attack. But, despite threats of a repeat this year, […]
Websites and apps around the world encourage researchers to find bugs in their system, but an Internet dating app for HIV positive people threatens the security researchers with HIV infection if they notify the company about any security bug in their app. Hzone, an application for HIV-positive singles that has over 4900 users were told […]
New day, new phishing attack! This time, it’s the Apple id which has been used by the attackers to steal from the innocent users. A phishing email has been discovered alerting Apple users that their Apple ID would be suspended if they do not complete a verification within time. The email further states that the […]
Short Bytes: As we are making progress on the front of online security, the cybercriminals are competing head-to-head to target every device connected to the internet. A similar threat is being predicted to affect the medical devices in the form of ransomware that will send life threats and ask for money. This year we’ve seen an unprecedented […]
Short Bytes: Belgian people have found a new weapon to deal with the terror threats in the form of cat pics. As police didn’t want people to tweet pictures of the recent police operation, Belgians responded with cat pictures to send a message to terrorists and confuse them. Tweeting cat pictures is the last thing […]
After calling Anonymous ‘Idiots’ ISIS issues guidelines to its cronies to protect from hackers like Anonymous The Islamic State militant ISIL who have claimed responsibility for the Paris terror attacks, responded to Anonymous’ declaration of “total war,” calling the hacker group “idiots” while offering guidance to its online followers to prevent cyberattacks. The move followed […]
A 15-year-old guy in Plymouth has been arrested by British police on the charges of launching DDoS attacks and for sending false bomb alerts via social media. According to the police, the boy was involved in launching DDoS attacks to servers belonging to companies in Africa, Asia, Europe, and North America. Furthermore, he also sent false […]
In an exclusive for We Live Security, Jean-Ian Boutin, a malware researcher at ESET, shares his thoughts on the past, present and future of banking trojans.
Cybercrime is more aggressive and confrontational than it has ever been, Europol’s latest Internet Organised Crime Threat Assessment (IOCTA) has stated.
Short Bytes: Lockheed Martin has decided to open source its secret cyber threat detection tool Laika BOSS at the Black Hat Conference in Las Vegas. FossBytes has always warned you about the levels to which the hackers and cyber attackers have reached. In the recent Black Hat Conference at Las Vegas, it has been brought […]
This year at Black Hat, the focus was as much on hacking the intersections of data as on a specific computer platform.
Someone hacked the official Twitter account of UK based controversial Television personality, The Sun’s columnist Katie Hopkins and threatened to leak a sex tape of her. Katie Hopkins, the queen of controversies had her Twitter account hacked Sunday morning where hackers posted several tweets claiming they have access to a sex tape which involves Hopkins. The verified Twitter account of Hopkins […]
The Supreme Court has reversed the decision to convict a Pennsylvania man who directed violent online threats at his ex-wife, citing intent as necessary legal grounds for conviction.
A military white paper said on Tuesday that China needs to take strong measures in order to speed up the development of a cyber-force to combat some serious security threats hovering upon its cyber infrastructure. Cyberspace is hailed as one of China’s four “critical security domains”, apart from the ocean, outer space and nuclear force, […]