Scammers are actively exploiting a bug in Firefox that causes the browser to lock up after displaying a message warning the computer is running a pirated version of Windows that has been hacked.
Network Solutions disclosed a security breach that happened in late August, and allowed a third-party to infiltrate some of the company’s computing systems.
Bed Bath & Beyond retailer disclosed that an unauthorized party obtained login information for some of its customers a report for the Securities and Exchange Commission (SEC) said on Tuesday.
More than a dozen iOS apps infected with clicker Trojan malware and distributed via the Apple App Store were found to perform ad fraud-related tasks in the background, using the command and control servers of a similar Android ad fraud campaign.
Hackers breached a server used by popular virtual network provider NordVPN and stole encryption keys that could be used to mount decryption attacks on segments of its customer base.
By now, the privacy threats posed by Amazon Alexa and Google Home are common knowledge. Workers for both companies routinely listen to audio of users—recordings of which can be kept forever—and the sounds the devices capture can be used in criminal trials.
Malicious plugins for WordPress websites are being used not just to maintain access on the compromised server but also to mine for cryptocurrency.
Two reports published in the last few months show that malware operators are experimenting with using WAV audio files to hide malicious code.