How To Check If Your Netgear Router is Vulnerable to this Password Bypass Flaw

FacebookTwitterLinkedinemail Again bad news for consumers with Netgear routers: Netgear routers hit by another serious security vulnerability, but this time more than two dozens router models are affected. Security researchers from Trustwave are warning of a new authentication vulnerability in at least 31 models of Netgear models that potentially affects over one million Netgear customers. […]

Los Angeles College Pays Hackers $28,000 Ransom To Get Its Files Back

FacebookTwitterLinkedinemail Ransomware has turned on to a noxious game of Hackers to get paid effortlessly. Once again the heat was felt by the Los Angeles Valley College (LAVC) when hackers managed to infect its computer network with ransomware and demanded US$28,000 payment in Bitcoins to get back online. The cyber-attack occurred over winter break and […]

It seems like the FBI has been hacked, once again! Plone CMS Exploit

FacebookTwitterLinkedinemail It seems like the FBI has been hacked, once again! A hacker, using Twitter handle CyberZeist, has claimed to have hacked the FBI’s website ( and leaked personal account information of several FBI agents publically. CyberZeist had initially exposed the flaw on 22 December, giving the FBI time to patch the vulnerability in its […]

Home routers under attack in ongoing malvertisement blitz

FacebookTwitterLinkedinemailDNSChanger causes network computers to visit fraudulent domains. As you read these words, malicious ads on legitimate websites are targeting visitors with malware. But that malware doesn’t infect their computers, researchers said. Instead, it causes unsecured routers to connect to fraudulent domains. Using a technique known as steganography, the ads hide malicious code in image […]

Facebook charged with misleading EU on $22 billion WhatsApp merger

FacebookTwitterLinkedinemailZuck’s firm “intentionally, or negligently, gave incorrect info”—Brussels’ antitrust chief.   Facebook has been accused of misleading the European Commission over its $22 billion takeover of WhatsApp in 2014—when the Mark Zuckerberg-run company claimed that it wouldn’t be able to knit together user IDs, thereby combining the data of the two services. Brussels’ competition officials […]

‘Biggest Ad Fraud Ever’: Hackers Make $5M A Day By Faking 300M Video Views

FacebookTwitterLinkedinemailA group of Russian criminals are making between $3 million and $5 million every day in a brazen attack on the advertising market, security firm White Ops claimed today. It’s the biggest digital ad fraud ever uncovered and perpetrated by faking clicks on video ads, the company said. The crew, which White Ops dubbed Ad […]

Interview with a hacker: Gh0s7, leader of Shad0wS3c

FacebookTwitterLinkedinemail One of the world’s top hackers reveals how attackers own corporate and government networks, how stolen data is sold, which exploit markets are exploding, and why hackers are excited about Android and IoT. By Dan Patterson | September 12, 2016, 10:05 AM PST The hacker’s fingers fly across a mechanical keyboard, filling the dark […]

How the Dark Web works

FacebookTwitterLinkedinemailBeneath our everyday internet lurks a murky network of encrypted sites known as the Dark Web. Is it all bad? No. But it does fuel a lucrative criminal subculture that could threaten businesses and consumers. By Dan Patterson | September 1, 2016 — 15:54 GMT (08:54 PDT) | Topic: Cyberwar and the Future of Cybersecurity […]

Cyberwar: The smart person’s guide

FacebookTwitterLinkedinemail Armies around the world are gearing up for cyberwarfare: here’s what it is and what you need to know. By Steve Ranger | May 19, 2016, 8:04 AM PST Cyberwarfare is real. Governments are pouring billions into making sure they can fight battles on the internet, and you might just get caught in the […]

IT Security in the Snowden Era

FacebookTwitterLinkedinemailThe Edward Snowden revelations have rocked governments, global businesses, and the technology world. When we look back a decade from now, we expect this to be the biggest story of 2013 and the one with lasting impact. Here is our perspective on the still-unfolding implications along with IT security and risk management best practices that […]