Hackers Can Steal Your Passwords Just by Monitoring SmartPhone Sensors
Do you know how many kinds of sensors your smartphone has inbuilt? And what data they gather about your physical and digital activities?
F-Secure on Thursday published a report detailing the activities of Callisto, a threat actor whose primary goal appears to be intelligence gathering from entities interested in European foreign and security policy.
Cerber Takes Ransomware Crown from Locky
In its second quarterly Cybercrime Tactics & Techniques report, Malwarebytes noted huge shifts in ransomware power dynamics: Over the past three months, Cerber ransomware took over as top-dog (90% of all detections), while the once-powerful Locky ransomware has basically dropped off the map (under
Lessons From Top-to-Bottom Compromise of Brazilian Bank
SINT MAARTEN—For three months starting last October, hackers pulled off a stunning compromise of a Brazilian bank’s operations top-to-bottom. The attack was comprehensive with each of the bank’s 36 domains, corporate email and DNS under the attacker’s control.