Scammers even run their own dark-web “travel agencies”, misusing stolen loyalty points and credit card numbers
Five ethical hackers have earned almost US$300,000 in bug bounty rewards – so far
In-game chats were flooded with messages from somebody who tried to coerce players into subscribing to a dubious YouTube channel
Unknown threat actors were able to exfiltrate information from the email accounts of several parliamentarians
As the US presidential election nears, the company’s new tech should also help assure people that an image or video is authentic
There is no evidence that cybercriminals were also able to steal customer data
The flaws, neither of which is being actively exploited, were fixed merely days after the monthly Patch Tuesday rollout
Attackers could have exploited the flaw to steal victims’ login credentials or install malware on their devices
Microsoft resolves a service disruption that affected Office 365, Outlook.com, Teams and other cloud-based services
NIST’s tool can help organizations improve the testing of their employees’ phish-spotting prowess
Some footage has already appeared on adult sites, with cybercriminals offering lifetime access to the entire loot for US$150
Sports and training data are more sophisticated and affordable than ever. With the democratization of (sports) performance data, is your personal information safe?
What are some of the key security risks to be aware of when using USB flash drives and how can you mitigate the threats?
As more and more hotels are turning rooms into offices, the FBI is warning remote workers of cyber-threats lurking in the shadows
What are some common strategies cybercriminals employ in extortion schemes and how can you mitigate the chances of falling victim to a cyber-shakedown?
The vulnerability could allow criminals to rack up fraudulent charges on the cards without needing to know the PINs
Threat actors may spread false claims about compromised voting systems in order to undermine confidence in the electoral process
The videoconferencing platform is making the feature available to users of both free and paid tiers
While wanting to return a found USB flash drive is commendable, you should avoid taking unnecessary risks, lest your device get infested and your data compromised
Zoom now supports phone calls, text messages and authentication apps as forms of two-factor authentication