Email Bomb Threats Follow Sextortion Playbook

Yesterday’s wave of email bomb threats appear to be an evolution of tactics by the same groups that earlier tried “sextortion” and personal threats, Talos researchers say. On December 13, dozens of organizations across the United States, Canada, Australia, and New Zealand received email messages demanding $20,000 in bitcoin in return for the location of […]

Read more
Shamoon Returns to Wipe Systems in Middle East, Europe

Destructive malware has been employed by adversaries for years. Usually such attacks are carefully targeted and can be motivated by ideology, politics, or even financial aims. Destructive attacks have a critical impact on businesses, causing the loss of data or crippling business operations. When a company is impacted, the damage can be significant. Restoration can […]

Read more
Iranian Hackers Target Nuclear Experts, US Officials

Hackers ramp up efforts to infiltrate email accounts of Americans responsible for enforcing severe economic sanctions on Iran. Iranian cyberattackers are stepping up their game after US President Donald Trump re-enforced severe economic sanctions on the country last month, the AP reports. Much of the cyber espionage activity targets American officials who make sure the […]

Read more
All Hands on Tech – iPhone XS review

It may be the best iPhone that Apple has ever made, with significant advances to the processor and the camera, and a design that’s classic. But with so much good competition on the market now from Android manufacturers, the higher price point and a strange decision to include a low-wattage charger with the device, the […]

Read more
Who Are You, Really? A Peek at the Future of Identity

Experts dive into the trends and challenges defining the identity space and predict how online identities will change in years to come. Identity and identity management are top-of-mind for security leaders across industries. Which data is sufficient to prove people are who they claim to be? How can identifiers be protected? And what happens when […]

Read more
Top