How DNC, Clinton campaign attacks fit into Russia’s cyber-war strategy
Was it to cover for hack, or part of info-war on NATO? Putin won’t tell. Continue reading How DNC, Clinton campaign attacks fit into Russia’s cyber-war strategy
Collaborate Disseminate
Was it to cover for hack, or part of info-war on NATO? Putin won’t tell. Continue reading How DNC, Clinton campaign attacks fit into Russia’s cyber-war strategy
Sites exploited by SoakSoak bots give the gift of CryptXXX malware. Continue reading Wave of business websites hijacked to deliver crypto-ransomware
Problems uncovered after employees walk off job with thousands of SSNs on flash drives. Continue reading FDIC was hacked by China, and CIO covered it up
Layoffs, legal disputes, and a major OS update shuffle the deck for privacy-focused phone. Continue reading Paint it black: Revisiting the Blackphone and its cloudy future
Tagged as “Ranscam”, Powershell and script-based malware is a botched smash-and-grab. Continue reading Posing as ransomware, Windows malware just deletes victim’s files
When you don’t keep customer data to begin with, the warrant canary is redundant. Continue reading Don’t have a canary: Why Silent Circle dropped its warrant warning page
Repository’s own account data not breached, affected passwords reset. Continue reading GitHub attacker launched massive login campaign using stolen passwords
The mobile device for the secure government set is now a “hardened” Samsung Galaxy S4. Continue reading Goodbye, Obamaberry. Hello, Obamadroid.
Fake Twitter account for Pulse nightclub asks for “contributions” through scam site. Continue reading Scammers have already started trying to exploit Orlando shooting for bitcoins
In related studies: Ice is cold; fire still hot. Continue reading More corporate shared folders in cloud filled with malware, research finds