Home Technology - Hacking

Technology - Hacking

Technology news and blogs

Hydro Hit by LockerGoga Ransomware via Active Directory

Targeted Crypto-Locking Malware Attack Follows French Firm Being Hit ...

The Document that Microsoft Eluded AppLocker and AMSISecurity Affairs

Experts analyzed an Office document containing a payload that is able to bypass Microsoft AppLocker and Anti-Malware Scan Interface (AMSI), Introduction Few days...

Ransomware Activity Declines, But Remains Dangerous Threat

One of the most visible attacks associated with SamSam hit the city of Atlanta on March 22, 2018. With multiple municipal computers encrypted by the ransomware, more than one-third of...

Does GDPR compliance reduce breach risk?

Compliance can be costly and often feels more like red tape and a barrier to business than anything that provides a benefit. A report by EY and the International Association...

Why real-time intelligence matters for managing third-party risk

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! As leading companies in every industry today are...

Google Online Security Blog: Open-sourcing Sandboxed API

When a software library parsing such data is sufficiently complex, it might fall victim to certain types of security vulnerabilities: memory corruption bugs or certain other types of problems related...

MySpace loses 12 years worth of photos, songs & video files

MySpace says it happened during a server migration project.Last time the once prominent social network website MySpace made headlines in 2016 after it suffered a massive data breach in which personal...

Vulnerability in Facial Recognition of Samsung S10 Variants

Experts have demonstrated that facial recognition in modern devices is unsecured and can be circumvented through simple tricks such as displaying an image or a video before a device. Samsung’s newest...

5 Vital Keys to Enhance Your Company’s Cybersecurity in US

The risk of cyber security threats in US companies remains...

A predatory tale: Who’s afraid of the thief?

In mid-February, Kaspersky Lab received a request for incident response from one of its clients. The individual who initially reported the issue to our client refused to disclose the origin...

APLICATIONS

HOT NEWS