Hackers Seeking Big Ransomware Payday By Attacking Acer Computers

Taiwanese tech giant Acer is the latest company to fall victim to relentless hackers. What makes the Acer breach especially noteworthy is the fact that the group behind the attack is demanding a fifty-million-dollar ransom, which is the highest figure any group has ever demanded. The only thing that even …

New Malware Takes Aim At Apple Developers

If you don’t spend much time in the Apple ecosystem, you may not realize that Xcode is a completely legitimate tool used in macOS for developing a wide range of software and applications. Recently, based on research conducted by SentinelLabs, it has come to light that hackers are abusing Xcode …

Massive Security Camera Hack Hits Some Corporate Businesses

A large US hacker collective claimed credit for something you may not have heard of yet called “#OperationPanopticon.” According to the group behind the attack, they compromised a high level administrator account at a Silicon Valley firm called Verkada, which runs a platform for security systems online. This enabled them …

Tax Time Brings Out the Hackers

It’s tax season once again! That, among other things, means that hackers and scammers are out in force, so beware! As in years past, the primary vehicle hackers and scammers use to run their various tax scams are phishing emails. They’re usually designed to appear as though they come from …

Facebook Adding Physical Security Key Support For Mobile Devices

Many industry insiders consider physical security keys used in the context of two-factor authentication login schemes to be the final word in digital security. That is because even if your password is compromised, if you’re using a physical piece of hardware that has to be inserted when prompted for to …

Another Malware Evolves To Gain Access To More Systems

One of the more disturbing trends this year is that worms are becoming popular among the hackers of the world again. We’ve seen a handful of new malware strains introduced in recent months with worm modules added to their code, allowing them to scan and infect Windows systems connected to …

Internet Browsers Blocking Some Ports Due To Security Vulnerabilities

If you rely on TCP port 554, you’ll probably want to do a bit of reconfiguration. Last year, security researchers discovered a new version of the NAT Slipstream vulnerability that allowed hackers to deploy malicious scripts in order to bypass a website visitor’s NAT firewall and access any TCP/UDP port …

New Windows Server 2022 Includes Security Improvements

Recently, Microsoft made an announcement regarding the particulars of Windows Server 2022, and there’s a lot to like in terms of built-in protections. That is amazing, even if you’re not especially concerned about security. Here’s a quick overview of what you can expect: First and foremost, Server 2022 will incorporate …

New Ryuk Ransomware Function Spreads Across Networks Quickly

In terms of ransoms paid, Ryuk is the most successful strain of ransomware in use today, having netted an estimated $150 million for the group behind the malicious code. According to a recent report published by France’s national cybersecurity agency, it just got even more dangerous. Ryuk has historically been …

New Ransomware Strains Have Researchers On Their Toes

Recently, researchers have discovered two new ransomware strains, dubbed “AlumniLocker” and “Humble”, both of which have very different ways of doing what they do. This highlights the ongoing development and diversification of the larger ransomware threat and underscores the fact that it will be a major cause for concern in …