Redis Database May Open Door To Ransomware Attack
As you probably know by now, ransomware is a particularly insidious form of hacking attack whereby a target computer’s files are locked or held hostage in some way, and besides […]
As you probably know by now, ransomware is a particularly insidious form of hacking attack whereby a target computer’s files are locked or held hostage in some way, and besides […]
The story of the fall of the hacker going by the alias “Track2” is an absolutely riveting one. Track2, whose real name is Roman Valerevich Seleznev, is a thirty-one year […]
If you’re a Mac user who downloads files using the torrent software called “Transmission,” you may want to check your machine for signs of infection. It was recently discovered that […]
There have been papers written and demonstrations conducted in recent months to show how it’s possible to wirelessly log your keystrokes. All of those demonstrations have relied upon specialized gear […]
If you’re one of the millions of Dropbox users around the world, you were probably mildly annoyed recently when you logged on to find that you were being forced to […]
Opera does not have anything that could be described as a commanding share of the web browser market, but as one of oldest and best loved browsers in existence, the […]
Shaun Treacy, the President of MHR (Millennium Hotels and Resorts) North America, has recently sent a communication to guests who stayed at some of the company's locations between March and […]
An interesting and disturbing new form of Ransomware was on display at this year's Def Con convention, in Las Vegas. So far as anyone knows, this is the first, proof […]
Much has been written in previous months about the explosion in growth of the (IOT) Internet of Things, and the security risks posed by that growth. Where PCs, laptops, and […]
In some important ways, the media has a tendency to distort the reality where hacking and data breaches are concerned. The stories that tend to make the headlines are the […]