Digital Transformation / DX
Artificial Intelligence / AI
Internet of Things
Hackers stories - Page 3
HBO breach: Centrify says ‘winter is coming’ for passwords
HBO’s soft underbelly was laid bare to the world after hackers stole 1.5 TB of data from its systems - Centrify says passwords' days are limited.
Want to cause chaos? ICIT says hacking elections is easy
Hackers at DEFCON were able to exploit vulnerabilities in voting machines in a matter of minutes - ICIT breaks down just how easy it is.
HBO’s Game of Thrones treasure chest ransacked by hackers
It would seem winter has come for HBO after hackers have stormed the company’s servers and looted the jewels within to leak data online.
New report details exploits of notorious cyberespionage group with EMEA targets
Known as CopyKittens, the group is politically-motivated and has increasingly been active in pursuing foreign espionage on strategic targets.
Javelin Networks: Give up on honeypots, because attackers will outsmart them
Honey tokens, which are honeypots that are not computers, are easily studied and avoided by the average attacker.
Hackers steal $32m of ethereum cryptocurrency – expert commentary and advice
In the second heist this week, hackers have stolen around US$32 million - Webroot senior threat analyst shares his commentary and insights.
Alphabay disappears: Three scenarios to look for next
Exit scams are one of the risks when conducting business in criminal marketplaces.
DRS CEO: “There are 3 groups of hackers: black, grey and white.”
Most of us get a mental image of an anonymous, hooded figure, bent over a computer in some dark recess of the web when the word hacker is mentioned.
The malware that brought down Ukraine – is it really that sophisticated?
Tenable director says the significance of this malware as a stand-alone event is in fact quite small - but vendors have some catching up to do.
Hackers are able to target your e-cigarette... Is nothing sacred?
"A lot of folks aren't aware that something like this is even possible."
Hackers run circles around Samsung's iris scanner security
It wasn’t exactly the kind of hacking you see in the Fast and the Furious franchise.
Pirates of the Caribbean film held ransom by, well.. pirates
The hackers have demanded an enormous undisclosed amount of money be paid in Bitcoin. Disney apparently refuses to pay, and is working with the FBI.
Spoiler alert: Hackers leak unreleased Netflix series
An unidentified hacker has released the highly anticipated Season 5 episodes of popular Netflix show Orange is the New Black.
When innocent mistakes turn into costly problems
While S&R professionals often think “outside-in” first when assessing threats, awareness of internal threats can also be a key requirement.
Synack to bring hacker-powered intelligence platform to APAC
Singtel Innov8 and HPE are some of the big investor names behind the first hacker-powered intelligence platform to the world.
Trend Micro's three tips to catch a hacker
If you know what you’re looking for you might be able to spot a potential hacker and an impending cyber attack.
Weekly Asia security roundup: China’s cybersecurity law, hackers speak out, the MINDEF breach, and Yahoo’s CEO
A new survey by Consilio found that legal technology professions remain ignorant of China’s new cybersecurity law.
Hackers speak out: New study turns security stats on their head
The study confirms suspicions that attack methods are becoming ever more unique, with 50% of hackers changing their attack methods for every target.
Cyber attacks are borderless and China isn’t immune, 360 Security says
360 Enterprise Security Group has commented on China’s inability to keep foreign cyber attacks out of its walls, and cyber crime is now ‘borderless'.
Why China’s new cybersecurity law is a threat to international businesses and innovation
Under the veil of cybersecurity, regulators will have access to information that could benefit Chinese firms at the expense of foreign business.
Russian hackers steal Olympic athletes data: Insights and advice from Webroot
Unless you’ve been living under a rock, you’d be aware of the recent hacking of the World Anti-Doping Agency (WADA) - here's Webroot's insights.
APAC takes 520 days too long to respond to threats, says FireEye
New research has found that it is taking APAC much longer than the rest of the world to detect cyber threats: a median 520 days.
Kaspersky Labs offers $50,000 'bug bounty' to security researchers
Security researchers Kaspersky Lab & bug bounty platform Hacker One are co-launching a Bug Bounty Program that offers $50,000 to security researchers.
Norton tackles hackers using Wi-Fi
“What turns people into easy targets is confusion about the security of public Wi-Fi networks."