39% of small businesses have no policy in place for storing and disposing of confidential paper documents.
Chrome vulnerability can allow attackers to steal user credentials
Google Chrome may not be as safe as it was thought to be. Recently, a security engineer, Bosko Stankovic, found a vulnerability in Google Chrome that hackers can easily exploit to get a user’s credentials such as their username and password and poten…
Chelsea Manning, Alleged Wikileaks Whistleblower Released from Jail 28 Years Early
Chelsea Manning, the first convicted source to Wikileaks is free from prison as of…
Source: Chelsea Manning, Alleged Wikileaks Whistleblower Released from Jail 28 Years Early appeared first on Freedom Hacker the number one source for hacking news, security news & everything cyber.
Bell Canada Breach Hits Nearly Two Million Customers
Canada’s largest telco claims no financial data has been exposed
New Cryptomining Threat Could Overshadow #WannaCry
Adylkuzz uses same NSA exploits as infamous ransomware campaign
WikiLeaks Posts User Manuals for CIA Malware AfterMidnight and Assassin
WikiLeaks recently leaked some files as part of its Vault 7 series, that contained user manuals for two malware called, Assassin and AfterMidnight. According to the documents, these viruses belong to the CIA.
What is AfterMidnight?
Unlike th…
Hackers hold unreleased Pirates of the Caribbean movie to ransom
The CEO of Disney Bob Iger has reportedly warned that hackers are holding the unreleased copy of “Pirates of the Caribbean” movie which is due to be released this summer by Disney franchise but the hackers are demanding a massive amount of ransom pay…
DocuSign Phisher Hacked Firm to Access Customer Emails
Electronic signature firm reveals phishing campaign is more targeted than first thought
#WannaCry Roars Back After Killing the Kill Switch
It took about a day for bad actors to hit back after a kill switch stopped WannaCry in its tracks.
Vietnam’s APT32 Marks a New Chapter in Cyber-espionage
APT32 demonstrates how newly-available tools and techniques give even less-resourced nation-states access to advanced capabilities.