Trump website defaced in second successive cyber breach
The US President Donald Trump standing in front of the American flag
Security

Trump website defaced in second successive cyber breach

Attackers briefly seize control of the presidential campaign website a week after Trump claimed “nobody gets hacked”
28 Oct 2020
Hackers demand ransom from therapy patients after clinic data breach
Distressed girl talks to shrink with notepad
Security

Hackers demand ransom from therapy patients after clinic data breach

Vastaamo CEO Ville Tapio was reportedly fired for obscuring information about the incident for more than two years
27 Oct 2020
Bank-targeting malware disguises itself as video conferencing software
Security

Bank-targeting malware disguises itself as video conferencing software

IBM says the Vizom malware is spreading through spam-based phishing campaigns
19 Oct 2020
New York finance watchdog says Twitter hack proves social media should be regulated
Twitter logo with security pictures
Security

New York finance watchdog says Twitter hack proves social media should be regulated

The New York State Department of Financial Services says social media firms have too much responsibility with little government oversight
15 Oct 2020
What is a Trojan?
Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
14 Oct 2020
What is two-factor authentication?
Security

What is two-factor authentication?

Passwords aren't secure; it's time to add multi-factor authentication
14 Oct 2020
What is ransomware?
ransomware

What is ransomware?

This type of malware could hit you hard in the pocket
14 Oct 2020
What is hacktivism?
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
13 Oct 2020
What is WannaCry?
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
12 Oct 2020
Active vs passive reconnaissance
penetration testing

Active vs passive reconnaissance

Exploring essential tools of both ethical and malicious hackers alike
12 Oct 2020
Microsoft: Iranian hackers are exploiting ZeroLogon flaw
Data on screen, viewed by shadowy hacker
Security

Microsoft: Iranian hackers are exploiting ZeroLogon flaw

The vulnerability can give the hackers full control over a target’s domain controller, resulting in a complete takeover
6 Oct 2020
Paying ransomware demands may breach international sanctions, US Treasury warns
A hacker in a darkened room with digital maps and computer equipment
Security

Paying ransomware demands may breach international sanctions, US Treasury warns

Advisories warn that it's illegal to engage with entities inside countries under economic sanctions
2 Oct 2020
Less than 1% of computer hacking offences resulted in prosecution in 2019
A man in handcuffs standing in front of computer equipment in a darkened room
hacking

Less than 1% of computer hacking offences resulted in prosecution in 2019

Of the 17,600 offences recorded in the UK, just 57 were able to be tried under the Computer Misuse Act, report finds
1 Oct 2020
US hospitals forced offline by reported Ryuk ransomware attack
A forlorn doctor in a facemask, looking out the window
ransomware

US hospitals forced offline by reported Ryuk ransomware attack

Universal Health Services employees have been told IT issues could go on for days
29 Sep 2020
IoT coffee machine hacked to demand ransom
Coffee beans made to look like a skull and crossbones
ransomware

IoT coffee machine hacked to demand ransom

Your morning brew could be disrupted by a lack of encryption and a reverse engineered firmware update
28 Sep 2020
Kaspersky blasts Amazon's indoor drone as a 'major security risk'
Amazon's new camera security drone, 'Always home'
hacking

Kaspersky blasts Amazon's indoor drone as a 'major security risk'

The IoT device could be used by hackers to locate valuables and map out routes through a home, researchers warn
25 Sep 2020
How to install Kali Linux on Raspberry Pi
Security

How to install Kali Linux on Raspberry Pi

Follow these simple steps to install the penetration testing software on the compact computer for mobile hacking
22 Sep 2020
British 'Dark Overlord' hacker jailed for five years in the US
ransomware

British 'Dark Overlord' hacker jailed for five years in the US

Nathan Wyatt is the only member of the prolific hacking group to be identified
22 Sep 2020
What is cyber warfare?
Security

What is cyber warfare?

We explain what cyber warfare is and why you need to pay attention to the threats posed
22 Sep 2020
'Largest ever' Magecart hack compromises 2,000 online stores
hacking

'Largest ever' Magecart hack compromises 2,000 online stores

The personal details of tens of thousands of customers were stolen from just one compromised Magento-powered site
15 Sep 2020
What is fileless malware?
malware

What is fileless malware?

This near-invisible threat can go virtually undetected by even the most advanced antivirus software
10 Sep 2020
Tesla was the target of "serious" ransomware attack
ransomware

Tesla was the target of "serious" ransomware attack

A Russian national allegedly attempted to bribe a Tesla employee to install malware on the company’s network
28 Aug 2020
Ex-Cisco engineer charged with wiping Webex Teams accounts
cyber crime

Ex-Cisco engineer charged with wiping Webex Teams accounts

Sudhish Kasaba Ramesh has pleaded guilty to accessing Cisco's cloud infrastructure and deploying code that deleted 456 VMs
27 Aug 2020