Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha

Advertisement 

×

Message

EU e-Privacy Directive

This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.

View e-Privacy Directive Documents

You have declined cookies. This decision can be reversed.

More than one in three health care providers have been hit with a cyber-attack over the past year, according to Imperva. This has caused 10% of them to pay a ransom or other extortion-related fee.

Amid an accelerating popularity of cryptocurrency, millions of online users have been running the risk of being left high and dry since the cybercriminals have started unleashing a huge threat with crypto jacking.

Even after the identification of a criminal operation that has been inserting malware into the firmware of the low-cost Android devices, it is still operating in many cellphones.

The FBI issued a warning on Friday claiming that Russian computer criminals had compromised hundreds of thousands of office and home routers and could shut down network traffics or collect user information.

A hacker who carried out attacks on a string of companies before selling customers’ data on the dark web has been jailed for more than 10 years.

Many Mac users reported in the past few weeks that a process named “mshelper” had been eating up a lot of CPU power and draining their batteries. It turns out that the process is associated with a piece of malware designed to mine for Monero (XMR) cryptocurrency.

Monitoring cyberthreats over time reveals interesting insights into the strategies used by cybercriminals and the evolution of the attack vectors they target. While the threat landscape continues to be quite diversified, trends do seem to run in predictable cycles.

Cybercriminals have hacked and infected at least 500,000 routers as well as storage devices in what is believed to be part of a planned attack on Ukraine by Russia.

Although the standard adequacy approach is an effective means of ensuring free flow of data from the EU to third countries, it would not reflect the breadth and depth of the UK-EU relationship, according to the latest proposals published by the UK Brexit negotiating team.

Banks have formidable barriers to external cyber attacks, but some are still vulnerable to internal attacks using social engineering, vulnerabilities in web applications and the help of insiders, a report reveals.

Page 1 of 3

Top News

Latest

1 in 3 Health Care Services in the US Hit By Cyber-Attack

May 27, 2018 Cyber Attack

1 in 3 Health Care Services in the US Hit By Cyber-Attack

More than one in three health care providers have been hit with a cyber-attack over the past year, according to Imperva...

Advertisement 

  1. Popular
  2. Trending
  3. Comments

Calendar

« May 2018 »
Mon Tue Wed Thu Fri Sat Sun
  1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 31      

Advertisement 

Advertisement