Ransomware attacks have been on the rise. This time around, the small Ontario, Canada town of St. Marys has been targeted. The ransomware organization behind the attack seems to be LockBit. So far though, no ransom has been paid. The town itself claims that most city functions are still operational and staff are still... Read more...
It's that time again, time for the listing of apps that you might have downloaded that contain malware or methods in which to plant malware on your phone. Specifically for those who utilize Android and the Google Play Store these apps flew under the radar just long enough to wreak havoc on at least 300,000 devices. We... Read more...
While malware and phishing are two different kinds of cyberattacks, threat actors sometimes use both methods in malicious campaigns. A threat actor known as Roaming Mantis appears to be doing exactly that in a new campaign documented by researchers at the cybersecurity firm SEKOIA. Roaming Mantis has previously... Read more...
Near the end of 2020, Apple introduced a dedicated app privacy section to the App Store, requiring developers to disclose what user information is linked to users’ identities and used to track them. Then, in May of 2021, Google announced that a similar feature was in the works for its Play Store. Almost a year later... Read more...
WordPress is one of the most popular and thus commonly used content management systems (CMS) on the web. However, it has a particular problem with add-on, extension, and plug-in authors abandoning their projects, and subsequently leaving gaping holes in site security. A case in point has been highlighted by the... Read more...
We cover both ransomware and Elden Ring fairly regularly here at HotHardware, but it’s a sad day when those two things meet. The ransomware attacks that often receive the most coverage are those that disrupt major supply lines and infrastructure, raising national security concerns. However, ransomware gangs carry out... Read more...
Phishing attacks employ various methods to trick users into handing over sensitive information, such as login credentials. Over time, as users have become more suspicious and email clients, web browsers, and IT departments have implemented anti-phishing measures, scammers have had to get creative and devise more... Read more...
Earlier this year, we wrote about a vulnerability in Honda’s remote keyless entry (RKE) system that hackers could exploit to lock, unlock, and start certain Honda and Acura vehicles. This particular vulnerability was the result of Honda using fixed codes in its RKE system. Many Honda and Acura key fobs send the same... Read more...
It's been three or four days since Microsoft rolled back the macro blocking update on "Current Channel" for Microsoft Office 365 users. Finally, we have a confirmed reason and some more information about the future of macros in Microsoft Office. According to a recent post the reasoning for rolling back the change... Read more...
Last year, a hacker who goes by the name “pompompurin” managed to breach a Federal Bureau of Investigation (FBI) web portal and send out thousands of hoax emails from an official FBI email address. Just a couple weeks prior, pompompurin gained unauthorized access to the internal network of the stock trading app... Read more...
Last week, we wrote about spyware that researchers gave the name “Hermit” and attributed to the Italian spyware vendor RCS Labs. Hermit falls within the same class of spyware as NSO Group’s Pegasus spyware, which infected at least nine phones belonging to US State Department employees. This sort of spyware is usually... Read more...
Secret Service Director James Murray has left his post in order to take over as the Chief Security Officer for Snap Inc. The 27-year veteran will serve his last day with the storied security service on July 30, 2022. The Secret Service is the cream of the crop when it comes to security. It undertakes protecting the... Read more...
In February security firms, researchers, infosec employees, antivirus, and malware organizations rejoiced. Why? Microsoft was finally disabling Visual Basic for Applications (VBA) macros on Microsoft Office. However, the Redmond software giant just took a step back and reversed course on the change, but why? What... Read more...
Last month, a ransomware gang known as ALPHV struck The Allison Inn & Spa, stealing employee and customer data. ALPHV then published this information to the open web, where it could be indexed by search engines and viewed without the use of the Tor network. While the website that presented the data for download wasn’t... Read more...
Earlier this year, multiple US law enforcement agencies completed a joint operation with authorities from the United Kingdom, Europol, Portugal, Germany, Sweden, and Romania. This coordinated police action, dubbed Operation TOURNIQUET, culminated in the seizure of the RaidForums domain names, as well as the arrest of... Read more...
Chrome is the most popular browser on the planet (in terms of market share) with billions of a users, and the unwanted side effect of that immense popularity in the tech space is it attracts bad actors. Such is the reason for the latest browser update—it comes with a warning from Google that one of the security... Read more...
Managing passwords across all your platforms and logins can be a nightmare. You have an account for your bank, social media, smart devices, doctor, gaming platforms, work, and probably a lot more. Fortunately, Google has started rolling out new password manager features to make your password juggling hopefully... Read more...
Most of us likely babysat, mowed lawns, or worked part-time jobs to earn money as teens. However, teens in 2022 have some rather interesting and unexpected ways to make some extra cash. Minors are reportedly developing, discussing, and selling malware through a Discord server. What happened to paper... Read more...
A cybersecurity report published last month revealed the passwords most commonly used by business owners and executives, and topping this list were “123456” and “password.” The commonality of such remarkably weak passwords among not just ordinary users, but high-ranking executives of large corporations is almost... Read more...
Malicious software, commonly known as malware, is one of many threats to both cybersecurity and privacy. Cybercriminals can distribute malware to achieve a number of different goals, including siphoning funds from cryptocurrency wallets, stealing login credentials, or establishing botnets. However, cybercriminals... Read more...
It's a new era and there's a new bully in schools. A financial bully to the school administrations, at least. That bully is ransomware, and he's an annoying jerk. Ransomware is an ever increasing threat that most recently has affected schools, governments, hospitals, and even individual users. This particular type... Read more...
Shortly after hitting Parker Hannifin Corporation, a major component supplier for Boeing and Lockheed Martin, the Conti ransomware group abandoned the Conti name and split off into smaller groups that coordinate with the larger group’s leadership. This move came after Conti targeted the government of Costa Rica with... Read more...
Prev 1 2 3 4 5 Next