Search Results For: forensics

Medical device manufacturer Artivion, who specializes in making products used by cardiac and vascular surgeons to treat patients, has been hit with a ransomware attack. It was severe enough attack that it has disrupted the companys operations to the point it needed to disable some of its systems. The company disclosed... Read more...
Over the years, Clop ransomware has hit a number of different targets across a wide variety of industries, from oil and gas to banking institutions. However, the latest organization to be entangled in the Clop trouble is Shutterfly, a photography and personalized items manufacturer based out of San Jose... Read more...
See Tickets, an online event ticket vendor that services both Europe and North America, has disclosed a major data breach affecting its payment processing portals. While the data breach notice is light on details, See Tickets customers should know that their payment information, including credit card credential, may... Read more...
If weve learned anything from reporting on phishing attacks, its that no company, organization, or institution is immune from becoming the victim of one. Even the US Department of Defense recently fell victim to a $23.5 million phishing scam. If anything, larger organizations simply make for larger and more attractive... Read more...
It would seem that not even GoDaddy can keep all the children of the internet behaving as they should. The very popular internet domain registrar and web hosting giant announced yesterday that its security was compromised last week. GoDaddy announced yesterday that it had discovered on November 17th there was an... Read more...
Just as there is a traditional weapons market, a private sector cyberweapons market enables people and organizations to attack anyone worldwide for a fee. However, Microsoft takes this threat of cyberweapons seriously, and is now working to fight the problem head-on. Yesterday, Microsoft's Cristin Goodwin, General... Read more...
Over the weekend, cybersecurity experts, forensics teams, and white-hat hackers worldwide have been battling the ransomware incident affecting Kaseya VSA customers. Now, the Florida-based IT and remote management company is reporting that fewer than 60 customers and 1,500 downstream companies have been affected... Read more...
As it goes, crime never pays, and neither does pirating software, as some people on the internet have come to find out. In the last year, there have been reports that popular antivirus programs, like Avast, disappeared from users computers. Researchers at the Czech company found that this activity was tied to a new... Read more...
Last week, the CEO of messaging app Signal got his hands on Cellebrite software, which is typically used for extracting data from mobile devices. Several security vulnerabilities were discovered with this acquisition, leading to Signal including files in its app that would corrupt all present and future data collected... Read more...
There is very little worse than knowing you've just lost everything to ransomware. When it happens on our phones, where so much of our identity and our lives live, the situation can feel hopeless. It's a never-ending battle for platform owners like Google, Microsoft, and Apple. Every time a company creates new... Read more...
What is Huawei willing to do to to get back into the good graces of the United States and other countries that have shunned it? A Huawei representative recently stated that the multinational company is ready to reveal its internal operations. Their goal is to assure national governments that they should not be... Read more...
Intel has been going through a bit of rough patch over the past few weeks, following the disclosure that its7nm products have been delayed, which led to an internal reorganization that resulted in the company'schief engineering officer departing the company. Now we're learning that Intel was also the victim of a... Read more...
Here we go again, the United States Federal Bureau of Investigation (FBI) is exerting pressure on Apple to help unlock an older iPhone model as part of a crime investigation, and just like before, there's another layer to the story. On the surface, it might seem reasonable to pressure a device maker to thwart its own... Read more...
A company that develops digital forensics tools for businesses and law enforcement specialists has found a way to hack into locked Apple iPhone devices running the latest version of iOS. The method is said to work on most iPhone models, from the iPhone 5s through the iPhone X, and is effective on iOS 12 through... Read more...
In what could pass for a scene in a movie, a hacker managed to breach a school district's database and steal 10 years worth of personal data belonging to half a million students and staff. Only this wasn't a movie, it happened in real life. Had it been a movie, the hacker would likely have been revealed to be a... Read more...
One of the cool features of the Tesla Model 3 is that it supports a phone key that allows you to give access to a car to friends or family so they can unlock and start it without a key. The phone key feature is also used by a rental car company out of Minnesota called Trevls. The company has announced that a thief was able to walk up to one Read more...
Seeing is believing, but you can't always trust your eyes, especially now that we are living in the digital age of photography. For better or worse, programs like Photoshop make it all too easy to manipulate an image. It's great for photographers who want to clean up their images, but can also be used for nefarious purposes. Can you ever really Read more...
A pair of macOS security experts have discovered a bug in the latest version of macOS that exposes the contents of files, including ones that are encrypted and are supposed to be safe from prying eyes. The security flaw exists within Apple's 'Quick Look' feature, which caches thumbnails and names of files, even when... Read more...
The AppleiPhone has become so common with both upstanding citizens and nefarious criminals that law enforcement frequently is faced with trying to unlock the devices of people who are suspects in crimes to gather evidence. For suspects that are deceased, gathering evidence can be a challenge for law enforcement... Read more...
Uber suffered a data breach back in October 2016 that affected tens of millions of people, and it is just now letting the public know about it, as 2018 rolls into view. This latest incident is yet another black eye for a company that has been beat up in the media over questionable decision making in the past, such as... Read more...
My phone just pinged. Did someone just like the Instagram photo of my dog? Is my Chipotle to-go order finally ready? Nope, I was one of the lucky one billion users whose Yahoo account was infiltrated by hackers, my personal information potentially compromised. This past November law enforcement provided Yahoo with... Read more...
Back in late October, Microsoft announced the Windows 10 Creators Update, which will arrive next spring for customers. At its keynote, Microsoft introduced a number of consumer-centric features including Paint 3D, improved inking support, and support for new virtual reality headsets. In the weeks since the original... Read more...
1 2 3 Next