Southern Philippines: Regular kidnappings in 2018 show kidnap for ransom remains a serious concern

PDF Download Militant groups retain capability and intent to target nationals On 28 June 2018 a kidnap for ransom group based in Zamboanga, southern Philippines, kidnapped six persons and demanded a ransom sum of PHP400,000 (USD7,500) for their release… Continue reading Southern Philippines: Regular kidnappings in 2018 show kidnap for ransom remains a serious concern

Two major Canadian banks hacked and blackmailed

The information of close to 90,000 customers from Simplii Financial and Bank of Montreal has reportedly been stolen by a group of hackers.
Categories:

Cybercrime
Hacking

Tags: BMOhackransomSimplii

(Read more…)

The post Two major Cana… Continue reading Two major Canadian banks hacked and blackmailed

Hackers demand $1m ransom after stealing data from 2 Canadian banks

By Uzair Amir
Hackers have stolen financial data of thousands of customers –
This is a post from HackRead.com Read the original post: Hackers demand $1m ransom after stealing data from 2 Canadian banks
Continue reading Hackers demand $1m ransom after stealing data from 2 Canadian banks

Poker tournaments disrupted after DDoS attacks on Americas Cardroom

By Waqas
Last year in September, Americas Cardroom (ACR), a popular online poker
This is a post from HackRead.com Read the original post: Poker tournaments disrupted after DDoS attacks on Americas Cardroom
Continue reading Poker tournaments disrupted after DDoS attacks on Americas Cardroom

SamSam ransomware: what you need to know

We take a look at SamSam ransomware, the malware that messed with Atlanta, and tell you how it works and what you can do to combat it.
Categories:

Cybercrime
Malware

Tags: atlanta ransomwareexploitsmalwareransomransomwaresamsamsamsam ransomware… Continue reading SamSam ransomware: what you need to know

Mobile security: Enterprise data via mobile is the next frontier for cyber criminals

2018 will be the year cyber criminals focus on enterprise mobile security weak spots, exploiting them to harvest sensitive information. All organizations face new security challenges as their workers increasingly go mobile and use a rapidly e… Continue reading Mobile security: Enterprise data via mobile is the next frontier for cyber criminals

Hackers take over power billing records of Indian state; demand ransom

By Uzair Amir
The AMR system (automatic meter reading system) of Uttar Haryana
This is a post from HackRead.com Read the original post: Hackers take over power billing records of Indian state; demand ransom
Continue reading Hackers take over power billing records of Indian state; demand ransom