A woman claims that she and her family were spied upon after an unknown party hacked their way into a “smart” baby monitor.
Researchers have reported an increase in activity for a Facebook-hijacking threat known as Faceliker.
David Bisson reports.
A security researcher has disclosed a password exfiltration zero-day that affects macOS version 10.13 (aka “High Sierra”) and earlier.
The U.S. Securities and Exchange Commission (SEC) has revealed that attackers might have used data they stole in a security breach for illicit insider...
More than three dozen public schools and other educational institutions canceled classes after receiving threats from a “cyber terrorist.”
Carelessness is believed to have exposed access credentials and other critical information assets owned by media giant Viacom Inc, leaving them viewable by anyone...
A hacking gang posted 3.12 terabytes of VEVO’s internal files online, after it discovered the company was being reckless with its security.
A company is offering up to one million dollars in bounties for anyone who finds and reports exploitable zero-day flaws in the Tor Browser.
Researchers have discovered a new attack vector they’ve named “BlueBorne” that enables bad actors to compromise nearly every connected device via Bluetooth.
David Bisson describes some of the ways you can protect yourself against identity thieves following the hack of Equifax.
Samsung has announced a new bug bounty program that offers rewards of up to $200,000 for qualifying vulnerability reports.
Three Equifax executives sold a combined $1.8 million worth of shares just days after the credit reporting agency discovered a massive data breach.
A young malware developer is using the same Skype ID for applying to jobs and advertising their Internet of Things (IoT) botnet.
Attackers have set up a dark web domain for their “Doxagram” site that offers for sale the email addresses and phone numbers of high-profile...
Security researchers have spotted a massive malware campaign that sent out 23 million messages laden with Locky ransomware in the span of 24 hours.