Ladies and gentlemen, for our main attraction, I give you…The HELK vs APTSimulator, in a Death Battle! The late, great Randy “Macho Man” Savage said many things in his day, in his own special way, but “Expect the unexpected in the kingdom of madnes…
Server-Side Exploits Take the Lead for Financially Motivated Hackers
At the same time, the number of known vulnerabilities doubled in 2017.
Niche Cryptocurrency Dentacoin Expands Focus and Gains Momentum
Dentacoin is coming to North America for the first time.
Roku-Based Smart TVs Open to Remote Takeover
Hackers can pump the volume to blaring levels, cycle through channels, open disturbing YouTube content or kick the TV off Wi-Fi.
RSA Security: Consumers Falsify Data to Safeguard PII
Majority would also boycott firms with poor track record on data security
Apple Calms Nerves After GitHub Code Leak
Smartphone giant says there’s nothing to worry about from iBoot leak
Over 19 Million Californian Voter Records Held for Ransom Again
Newspaper’s error means firewall was down for two weeks
Air Gaps, Faraday Cages Can’t Deter Hackers After All
One method exploits the magnetic field generated by a computer’s CPU.
Litecoin Emerges as Most Popular Dark Web Currency, After Bitcoin
Surprisingly, it’s not Dash.
81% of Cybersecurity Pros See Value in Threat Intelligence
68% of organizations are currently creating or consuming threat data.