Cyber Attacks/Espionage

Cyber Attacks/Espionage news, information, and how-to advice

edward snowden
russian flag concept

iphone7 Apple store

Flash mobs the latest threat this holiday season

The holiday season rings in more than just higher sales for retailers. There's also more shoplifting and lower profit margins than the rest of the year, according to a report released today. Plus, this year, there's an extra surprise...

DDoS Outage Map

Amateurs were behind the Dyn Inc. DDoS attack, report says

Flashpoint Intel released a brief after action report on Tuesday, outlining some of their observations following Friday’s DDoS attack against Dyn Inc., which affected traffic to a number of high-level domains. Among the report’s...

capitol dome congress

National security brain drain

U.S. Government National Security Officials Bolting for Commercial Companies


Friday's IoT-based DDoS attack has security experts worried

The cybersecurity attack that relied on connected devices, or the Internet of Things, was serious, unusual and historic.

cybersecurity skills and talent shortage

Cybersecurity staffing issues may be putting you at risk

Cybersecurity is a priority for most businesses, but many are finding a lack of available cybersecurity talent. But not being able to hire the right candidates is no excuse to ignore your security needs.

Network servers

DomainTools suggests password changes after a vulnerable script leaks data

On Monday, DomainTools, an intelligence platform used by researchers around the globe, warned customers to change their passwords after a weekend incident correlated existing accounts with data previously exposed in some of this...

DDoS Outage Map

DDoS knocks down DNS, data centers across the U.S. affected

On Friday morning, organizations across the internet – including GitHub, Twitter, Spotify, SoundCloud, Reddit, and the New York Times – disappeared after an attack was launched against Dyn Inc., an infrastructure provider that offers...

Halo Wars 2 - Blitz

Fasten your seatbelt in the IoT cybersecurity race

To address the magnitude of the problem, industry groups, vendors and government bodies need to start and accelerate developing a unified principle and framework around IoT security challenges, and outline the issues to pull in the...

binoculars looking watch outlook future

Cybersecurity Industry Outlook: 2017 to 2021

Four predictions from Cybersecurity Ventures frame the cybersecurity economy over the next five years, from 2017 to 2021.

weebly corporate logo

Weebly data breach affects 43 million customers

Weebly, a San Francisco-based company that has allowed more than 40 million people create websites with since 2007; will start sending notification letters to all of their customers on Thursday, informing them of a data breach that...

adultfriendfinder screengrab

Penthouse, Adult FriendFinder databases leak, at least 100 million accounts impacted

Databases recently obtained by LeakedSource, as well as source code, configuration files, certificate keys, and access control lists, point to a massive compromise at FriendFinder Networks Inc., the company behind...

russian police

Czech police arrest Russian hacker suspected of targeting the US

Police in the Czech Republic have arrested a Russian hacker suspected of targeting the U.S. for cyber crime.

hidden danger polaroid

Hackers hide stolen payment card data inside website product images

Attackers compromise online shops and store stolen payment card details inside legitimate image files in order to avoid detection.

careers 2

Building the DHS cybersecurity workforce

At the U.S. Department of Homeland Security (DHS), we fight against the world’s toughest cyber adversaries. Our best weapon is our people. So today, we are sharing two videos with you to help us meet this mission. They show the work...

woman iphone laptop usb

Younger consumers more likely to fall for tech support con jobs

Contrary to conventional wisdom, it's not older consumers who are most easily duped by tech support scams.


Time to destroy the hacker’s ballistic missile

A blog post for 'Enemy at the Gates' using the recent SWIFT hacking incidents to show the need for replacing conventional email technology. In addition to illustrating the cybersecurity vulnerabilities inherent in current email...

Election 2016 teaser - Republican vs Democrat

Republicans hacked, skimmed NRSC donations sent to Russian domain

Republicans who gave money to the National Republican Senatorial Committee this year, might want to check their credit card statements. Those who donated to the NRSC between March 16 and October 5, 2016, conducted their transaction on...

business man holding money bag

Yahoo shows that breach impacts can go far beyond remediation expenses

Several studies have come out recently trying to get a handle on the total costs of a data breach, with a large variation in costs - from less than $1 million on average, to $6 million - based on the data sets and types of included...

Load More