Inside such powerbanks is a GPS module and a cellular communication module with a SIM card.
The devices also perform their main function-they charge the equipment, but they can also record the conversation of their owner at any time and send it to a remote server.
The spy device contains a GPS...
The court found the 17-year-old student guilty of committing a criminal offense under Article 273 of the Criminal Code of the Russian Federation.
In Vats, a student was charged with hacking the website of the Ministry of Education of the Novosibirsk Region. Studying remotely, a student of the...
The attackers gained access to the e-mail of a number of Finnish deputies.
According to the Finnish Parliament, hackers gained access to its internal IT system and hacked the e-mail of some deputies. The incident took place in the autumn of this year, but was discovered by IT specialists of...
After 2012, Apple loosened the protection of devices and began to apply strong encryption to less data.
A group of cryptography experts has offered a theory about why law enforcement is still able to hack the iPhone, despite the constant iOS fixes and security levels of the mobile device...
The suspects used the stolen personal data of users to commit cybercrimes.
In the UK, as part of the fight against cybercrime, 21 people were arrested who acquired access to data stolen as a result of hacking other websites on the now-defunct WeLeakInfo resource.
According to the National...
In the company itself, Microsoft said that it did not identify any vulnerabilities and traces of hacking of the provided products or cloud service.
Allegedly, Russian hackers broke into the computer systems of a corporate partner of Microsoft and stole emails from users of Microsoft cloud...
Experts have identified more than twenty modified extensions, including the popular Frigate Light, Frigate CDN and SaveFrom.
Experts from Kaspersky Lab and Yandex have discovered a large-scale potentially malicious campaign in which attackers inject malicious code into browser extensions...
58% of users deceived by phone scammers independently transferred money.
Telephone and Internet scammers in 2020 earned about 150 billion rubles from Russian citizens, 66 billion rubles of which fall on the income of attackers posing as Bank employees. According to analysts of BrandMonitor...
The price for a fully managed DDoS attack is $165 on the darknet.
image
Cybersecurity researchers at Flashpoint have reported rising prices for access to RDP servers, stolen payment card data and a "DDoS-as-a-service" business model on underground forums and trading platforms.
"As a result of...
On the hacker forum found a database containing email addresses and physical addresses of owners of hardware wallets Ledger, according to the publication Bleeping Computer.
Journalists recall that in the summer of this year, the company Ledger suffered from a data leak, and a vulnerability on...
Ledger has confirmed that the publication of the stolen data is likely linked to the June 2020 hack.
The attacker posted stolen email addresses and email addresses of users of the Ledger cryptocurrency wallet on the hacker forum Raidforum.
Recall that on June 25 of this year, hackers gained...
During the police operation, law enforcement officers managed to partially disrupt the work of the most popular trading platform, where cybercriminals sell and buy stolen data. This is evidenced by the reports of resource administrators and sources who had access to it, according to the...
Experts from Israel's Ben-Gurion University demonstrated the AIR-FI attack, a new method for extracting data from machines that are physically isolated from any networks and potentially dangerous peripherals. such computers are often found in government systems and corporate networks, they store...
Thousands of organizations are at risk of cyberattacks due to uncorrected urgent/11 and cdpwn vulnerabilities affecting operating technology (ot) and iot devices, respectively.
according to armis specialists, 97% of all ot equipment used today contains uncorrected urgent/11 vulnerabilities...
As SecurityLab wrote earlier, on December 13, SolarWinds reported that it was the victim of a cyber attack on the supply chain. Hackers funded by a foreign government broke into the networks of an American software manufacturer and implemented a malicious update for its Orion software in order...
the israeli developer of artificial intelligence processors habana labs, owned by intel, was subjected to a cyber attack using extortionate software, during which attackers stole confidential data.
The operators of the pay2key ransomware published on their website on the darknet files allegedly...
The number of IoT devices and SCADA systems connected to the Network without appropriate security measures continues to increase, making critical devices vulnerable to potential attacks and hacking attempts. A&O IT Group researchers reported that despite a number of high-profile attacks on SCADA...
Foreign-backed hackers stole data from the U.S. Treasury Department and the National Telecommunications and Information Administration (NTIA).
At the same time, information about which country's authorities are considered to be involved in the incident is not provided.
"The U.S. government is...
Many modern smartphones have a fingerprint scanner to authorize access to the device, log in to your account, confirm payments, and other operations. The scanner is designed for secure authentication, but researchers have discovered new ways to manipulate it for malicious purposes. Security...
Chinese cybercrime group APT is suspected of hacking the network of a Mongolian software company and hacking a chat app used by hundreds of Mongolian government agencies.
According to experts from ESET, the attack occurred in June of this year. Hackers attacked an application called Able...