One of the most significant events in computer security happened in April 2017, when a still-unidentified group calling itself the Shadow Brokers published a trove…View More Stolen NSA Hacking Tools Were Used In The Wild 14 Months Before Shadow Brokers Leak
For the past few weeks, a threat actor who goes online by the name of “Subby” has taken over the IoT DDoS botnets of 29…View More Hacker Takes Over 29 IoT Botnets
Hundreds of millions of internet users continue to put themselves at risk of having their accounts hacked by using incredibly simple and commonly used passwords…View More These are the most commonly hacked passwords – is one of them yours?
On Friday, Microsoft sent out notification emails to some users informing Outlook account owners of a breach the company suffered and which might have also…View More Microsoft discloses security breach that impacted some Outlook accounts
As technology advances and the costs of connecting electronic components to the internet decreases, the cost of having a connected “smart home” also decreases. Sensors…View More The Risk of “Credential Stuffing” to the Smart Home
Industrial control systems in manufacturing, energy, chemical and other environments are coming under an increasing number of cyber attacks, as hacking groups of all kinds…View More Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers
Penetration testing is a direct test of an application, a device, a website, an organization, and even the people that work at an organization. It…View More Penetration Testing: Breaking in to Keep Others Out