Email Bomb Threats Follow Sextortion Playbook

Yesterday’s wave of email bomb threats appear to be an evolution of tactics by the same groups that earlier tried “sextortion” and personal threats, Talos researchers say. On December 13, dozens of organizations across the United States, Canada, Australia, and New Zealand received email messages demanding $20,000 in bitcoin in return for the location of […]

Read more
Shamoon Returns to Wipe Systems in Middle East, Europe

Destructive malware has been employed by adversaries for years. Usually such attacks are carefully targeted and can be motivated by ideology, politics, or even financial aims. Destructive attacks have a critical impact on businesses, causing the loss of data or crippling business operations. When a company is impacted, the damage can be significant. Restoration can […]

Read more
Iranian Hackers Target Nuclear Experts, US Officials

Hackers ramp up efforts to infiltrate email accounts of Americans responsible for enforcing severe economic sanctions on Iran. Iranian cyberattackers are stepping up their game after US President Donald Trump re-enforced severe economic sanctions on the country last month, the AP reports. Much of the cyber espionage activity targets American officials who make sure the […]

Read more
All Hands on Tech – iPhone XS review

It may be the best iPhone that Apple has ever made, with significant advances to the processor and the camera, and a design that’s classic. But with so much good competition on the market now from Android manufacturers, the higher price point and a strange decision to include a low-wattage charger with the device, the […]

Read more
Top 6 smartphones for business 2018: OnePlus 6T

We’re counting down the top smartphone of 2018 as we close out 2018. Come back every day of the week of Dec. 17-21 to see where the year’s best devices rank and let us know what you think in the comments at the bottom of the page. The OnePlus 6T is the go-to phone for […]

Read more
Cyber Security Today: Dec. 14, 2018 – A new phishing lure, another bad Mac app and interesting reading

A new phishing scam tries to capture passwords, another bad Mac app discovered and interesting reading from government committees in Canada and the U.S. Welcome to Cyber Security Today. It’s Friday December 14th. To play the podcast, click on the arrow below: Phishing attacks take many forms. Usually, they’re email messages that ask you to […]

Read more
How to protect yourself as the threat of scam apps grows

As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices? There’s nothing new about advertisers and app developers using deceptive practices, but the Touch ID scam that Lukáš Štefanko wrote about recently is a significant twist in this ongoing story. Of course, iOS users are not alone […]

Read more
Malaysian government targeted with mash-up espionage toolkit

An interview with ESET researchers Tomáš Gardoň and Filip Kafka on their research of a malware toolkit used in espionage against the Malaysian government In a presentation at AVAR 2018, ESET’s Tomáš Gardoň and Filip Kafka uncovered their research of a previously undocumented espionage toolkit, used in targeted attacks against the Malaysian government in mid-2018. […]

Read more
Universities Get Schooled by Hackers

Colleges and universities are prime targets for criminals due to huge sets of personal information and security that is weaker than in many businesses. As university students leave campus for holiday breaks, they may carry more than new knowledge home to family and friends. Recent research points out that colleges and universities are coming under […]

Read more
Top