Security

Security researcher updates OMG Cables to record user keystrokes

Security researcher Mark Green, (who goes by MG) has revealed to the Vices team at Motherboard that he and his team have upgraded their version of a hacked Lightning cable in a way that allows a hacker to record keystrokes ...

Security

The curious case of the $600 million crypto heist

Cryptocurrency investors have been transfixed over the past few days by the antics of a mysterious hacker who stole more than $600 million—before gradually giving it back.

Business

Cyber security firm Norton buys Avast for over $8 bn

US cyber security giant NortonLifeLock is to buy Czech rival Avast for over $8 billion to create a leading consumer business, the pair announced Wednesday after the pandemic fuelled online activity.

Business

Record cryptocurrency heist valued at $600 mn

A firm specializing in transferring cryptocurrency said Tuesday that hackers cracked its security, making off with a record-setting haul potentially worth $600 million.

Electronics & Semiconductors

Vulnerability found in Kindle e-reader

A team of researchers at security firm Check Point Research has discovered a vulnerability in Kindle e-readers—one that could allow hackers to take over the device, delete data and potentially gain access to Amazon account ...

Internet

Trump hacker and friends on a mission to fix the internet

When a massive cyberattack took out everything from Swedish supermarkets to New Zealand kindergartens this month, a group of Dutch ethical hackers breathed a collective sigh of frustration. They had been so close to stopping ...

Security

Ransomware gang goes offline, prompting questions

A Russian-based hacker group blamed for a massive ransomware attack went offline Tuesday, sparking speculation about whether the move was the result of a government-led action.

Security

Microsoft patches 'PrintNightmare' flaw in Windows

Microsoft on Wednesday urged users of Windows-powered computers to install a freshly released patch to thwart hackers trying to take advantage of a potentially serious flaw in the operating system.

page 1 from 9