macOS users have been attacked for at least five years by the osaminer malware, which skillfully evaded detection using AppleScript technology.
macOS-based computers have long been used by scammers for hidden cryptocurrency mining. For five years, the osaminer program managed to avoid...
The attacker was engaged in extortion, blocking the operation of computer systems using malware.
The Uraisk City Court of the Khanty-Mansiysk Autonomous Okrug-Ugra sentenced a Russian citizen who engaged in cyber fraud on the territory of the Republic of Belarus to two years in prison...
The protesters were able to access computers left unattended after the evacuation of Congressional staff.
The storming of the US Congress building in Washington, among other things, can pose a threat to cybersecurity, experts say.
On Wednesday, January 6, supporters of Donald Trump broke into...
Popular messenger WhatsApp threatens users with account blocking for refusing to accept the new terms of use of the application.
On February 8, the popular WhatsApp messenger will enter into force new Terms of Use. Developers are already preparing for the transition and will soon start...
MSTR declined by as much as 12.6% on Monday as Bitcoin pulled back sharply from $40,000 levels.
Shares of MicroStrategy (MSTR), a business intelligence firm with considerable exposure to Bitcoin (BTC), declined sharply on Monday as profit-taking ensued following a parabolic rally over the past...
A Kaspersky Lab study claims that the malware used by attackers during a cyberattack on US government agencies in December is similar to tools that are linked to Russian hackers.
Hackers broke into the IT systems of US government agencies using tools used by the Russian cybercrime group Turla...
According to Durov, Apple is more dangerous than Google, because it can completely restrict users ' access to the applications they use.
Telegram founder Pavel Durov said in his blog that Apple may restrict the freedom of users. Therefore, it is better for users to switch from the iOS platform...
Unauthorized access to the file-sharing service of the central bank of New Zealand was obtained by an unknown group of hackers, the press service of the regulator reported on January 10.
image
Unauthorized access to the file-sharing service of the central bank of New Zealand was obtained by an...
Operators of the chastitylock ransomware attacked users and blocked their IoT devices, depriving the wearer of the opportunity to remove it.
The source code of the chastitylock ransomware, which is used to carry out attacks on users of the" smart " Bluetooth lock of male chastity, has now been...
Altcoins are surging higher as Bitcoin price consolidates and the prospect of a $3 trillion economic stimulus package sparks confidence in crypto investors.
The bullish momentum seen throughout the week has spilled over into the weekend as the majority of the top-100 tokens listed on...
The database contains 1.3 million records of registered users.
According to the telegram channel of information leakage, an announcement about the sale of a database containing the data of 1.3 million registered users of the site appeared on the shadow forum hyundai.ru.
According to the...
Due to the" abnormal behavior " of the fingerprint scanner in the Galaxy Note20 series smartphones, the smartphone could be unlocked by any unauthorized person simply by scanning their finger.
image
Manufacturers of modern gadgets are constantly improving the protection of their devices, trying...
United States intelligence agencies believe that the massive hacking attack on federal agencies in December was an attempt to obtain intelligence and "probably originated from Russia."
The Federal Bureau of Investigation( FBI), the US Cybersecurity and Infrastructure Protection Agency (CISA) and...
The problem has been known since at least June 2019, but it still remains uncorrected.
Cloudflare's Web Application Firewall (WAF), used by more than 25 million sites, contains a vulnerability that allows you to bypass the rules and carry out an XSS attack. It is noteworthy that the problem has...
A U.K. judge ruled against extraditing the WikiLeaks founder to the U.S. in response to his legal team arguing he would have a "high risk of serious depression leading to suicide."
Amid speculation on social media that United States President Donald Trump may still pardon Julian Assange before...
Hackers gained access to phone numbers, the number of phone lines connected to the account, and information related to calls.
American mobile operator T-Mobile reported another data leak, which became the fourth in a row in the last three years.
"Our cybersecurity team recently discovered and...
The price of Bitcoin surged past $33,000 as buyers on Coinbase aggressively accumulated BTC.
Coinbase has seen a large spike in buyer activity overnight as the price of Bitcoin (BTC) surpassed $32,500 on Jan. 2. Analysts say the trend was reminiscent of MicroStrategy’s Bitcoin accumulation...
Law Enforcement officers from the US Federal Bureau of Investigation warned of a new unpleasant trend: hackers break into various "smart" devices, and then call home to their victims a special forces outfit (the so-called "swatting", from the English swatting) to broadcast what is happening...
Google has fixed a vulnerability in its feedback tool used in its services. The vulnerability allowed you to steal screenshots of confidential documents from the Google Docs service by simply embedding them in a malicious site.
The vulnerability was discovered on July 9 by security researcher...
Just two weeks after tackling $20,000, Bitcoin passes the $30,000 mark on the second day of 2021.
Bitcoin (BTC) hit a fresh psychological landmark on Jan. 2 as the new year kicked off to a flying start for hodlers.
BTC/USD weekly candle chart (Coinbase). Source: Tradingview
BTC price wastes no...