Toss a Coin to your Helper (Part 2 of 2)

Avast –  Avast –  In the first posting of this series, we looked at a clipboard stealer belonging to the MyKings botnet. In this second part of the blog series,…

Ethical Hacking, book review: A hands-on guide for would-be security professionals

Ethical Hacking: A Hands-on Introduction to Breaking In • By Daniel G Graham • No Starch Press • 376 pages • ISBN 9781718501874 • £41.99 / $49.99    The parlous…

MosesStaff Locks Up Targets, with No Ransom Demand, No Decryption

A politically motivated group is paralyzing Israeli entities with no financial goal — and no intention of handing over decryption keys. The MosesStaff hacking group is aiming politically motivated, destructive…

Israeli Entities Targeted by the New Politically-motivated “Moses Staff” Hacking Group

Moses Staff, a new cybercrime organization, has recently taken credit for multiple attacks targeting Israeli companies, which appear to be politically motivated since no ransom requests are made. In the…

70% of WiFi Networks Cracked by Researcher to Show Their Lack of Security

A researcher wanted to prove that a hacker could hijack a home network with ease by exploiting their lack of security, so he cracked 70% of a 5,000 WiFi network…

Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack

Visible says yes, user accounts were hijacked, but it denied a breach. As of today, users are still posting tales of forcibly changed passwords and getting stuck with bills for…

What Is Hashing and How Does It Work?

The notion of a hash is one that you’ll come across repeatedly in any discussion regarding cybersecurity. These seemingly random sequences of numbers and letters are created and employed in…