He was found guilty of stealing the personal data of 100 million people in the United States through hacker attacks.
Tyurin was found guilty on several counts. Ultimately, Judge Laura Swain, who handled the case, upheld the prosecution and handed down a sentence that would see Tyurin spend 144...
Due to the" abnormal behavior " of the fingerprint scanner in the Galaxy Note20 series smartphones, the smartphone could be unlocked by any unauthorized person simply by scanning their finger.
image
Manufacturers of modern gadgets are constantly improving the protection of their devices, trying...
Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation.
It should be used on webservers and available on Docker.
Watcher capabilities
Detect emerging vulnerability, malware using social network & other RSS sources...
United States intelligence agencies believe that the massive hacking attack on federal agencies in December was an attempt to obtain intelligence and "probably originated from Russia."
The Federal Bureau of Investigation( FBI), the US Cybersecurity and Infrastructure Protection Agency (CISA) and...
The problem has been known since at least June 2019, but it still remains uncorrected.
Cloudflare's Web Application Firewall (WAF), used by more than 25 million sites, contains a vulnerability that allows you to bypass the rules and carry out an XSS attack. It is noteworthy that the problem has...
A U.K. judge ruled against extraditing the WikiLeaks founder to the U.S. in response to his legal team arguing he would have a "high risk of serious depression leading to suicide."
Amid speculation on social media that United States President Donald Trump may still pardon Julian Assange before...
The function of checking whether user usernames and passwords were stolen will appear in the Microsoft Edge browser after its update, which is scheduled for release in January.
The browser will constantly check the information with databases of information about declassified usernames and...
Hackers gained access to phone numbers, the number of phone lines connected to the account, and information related to calls.
American mobile operator T-Mobile reported another data leak, which became the fourth in a row in the last three years.
"Our cybersecurity team recently discovered and...
Law Enforcement officers from the US Federal Bureau of Investigation warned of a new unpleasant trend: hackers break into various "smart" devices, and then call home to their victims a special forces outfit (the so-called "swatting", from the English swatting) to broadcast what is happening...
Google has fixed a vulnerability in its feedback tool used in its services. The vulnerability allowed you to steal screenshots of confidential documents from the Google Docs service by simply embedding them in a malicious site.
The vulnerability was discovered on July 9 by security researcher...
Just two weeks after tackling $20,000, Bitcoin passes the $30,000 mark on the second day of 2021.
Bitcoin (BTC) hit a fresh psychological landmark on Jan. 2 as the new year kicked off to a flying start for hodlers.
BTC/USD weekly candle chart (Coinbase). Source: Tradingview
BTC price wastes no...
The court found the 17-year-old student guilty of committing a criminal offense under Article 273 of the Criminal Code of the Russian Federation.
In Vats, a student was charged with hacking the website of the Ministry of Education of the Novosibirsk Region. Studying remotely, a student of the...
The attackers gained access to the e-mail of a number of Finnish deputies.
According to the Finnish Parliament, hackers gained access to its internal IT system and hacked the e-mail of some deputies. The incident took place in the autumn of this year, but was discovered by IT specialists of...
In the company itself, Microsoft said that it did not identify any vulnerabilities and traces of hacking of the provided products or cloud service.
Allegedly, Russian hackers broke into the computer systems of a corporate partner of Microsoft and stole emails from users of Microsoft cloud...
Experts have identified more than twenty modified extensions, including the popular Frigate Light, Frigate CDN and SaveFrom.
Experts from Kaspersky Lab and Yandex have discovered a large-scale potentially malicious campaign in which attackers inject malicious code into browser extensions...
58% of users deceived by phone scammers independently transferred money.
Telephone and Internet scammers in 2020 earned about 150 billion rubles from Russian citizens, 66 billion rubles of which fall on the income of attackers posing as Bank employees. According to analysts of BrandMonitor...
The price for a fully managed DDoS attack is $165 on the darknet.
image
Cybersecurity researchers at Flashpoint have reported rising prices for access to RDP servers, stolen payment card data and a "DDoS-as-a-service" business model on underground forums and trading platforms.
"As a result of...
On the hacker forum found a database containing email addresses and physical addresses of owners of hardware wallets Ledger, according to the publication Bleeping Computer.
Journalists recall that in the summer of this year, the company Ledger suffered from a data leak, and a vulnerability on...
Ledger has confirmed that the publication of the stolen data is likely linked to the June 2020 hack.
The attacker posted stolen email addresses and email addresses of users of the Ledger cryptocurrency wallet on the hacker forum Raidforum.
Recall that on June 25 of this year, hackers gained...
During the police operation, law enforcement officers managed to partially disrupt the work of the most popular trading platform, where cybercriminals sell and buy stolen data. This is evidenced by the reports of resource administrators and sources who had access to it, according to the...