Chinese Security Firm Document Dump Reveals Methods Used to Spy on Uyghurs, Hong Kong, Dissidents Overseas
A massive trove of leaked documents reveals Chinese security firm I-Soon worked as hackers under contract to the Chinese government.
A massive trove of leaked documents reveals Chinese security firm I-Soon worked as hackers under contract to the Chinese government.
A report from the World Economic Forum (WEF) claims AI-powered misinformation is the leading short-term threat to the global economy.
Microsoft’s AI-powered Bing Chat has recently fallen prey to a sophisticated malware advertising campaign, with malicious ads infiltrating conversations and directing users to fake download sites known to distribute malware.
The FBI on Tuesday announced a successful multinational operation to take down a cybercrime ring known as “Qakbot.” The gang used an enormous botnet to spread ransomware through spam emails, inflicting hundreds of millions of dollars in damage on computer users around the world.
The recent lawsuit between Epic Games and Apple has revealed a number of details about a 2015 App Store hack in which malware was loaded into thousands of iPhone apps. The malware impacted about 128 million iPhone users.
Researchers say that a tip from a child led them to discover aggressive adware in iOS and Android smartphone apps with a combined 2.4 million downloads across the iPhone App Store and Google Play Store. The malware apps targeted young children and were promoted on social media apps including TikTok.
Researchers at the UK’s University of Cambridge have created a new software technology that treats online “hate speech” as a computer “virus” or “malware.”
A data breach based on malware in the payment system of iconic east coast convenience store chain Wawa that struck “potentially all” of its locations may have compromised the payment details of a large number of customers. Wawa leadership apologized to customers for the breach in a letter over the weekend.
Researchers have exposed a network of Facebook accounts used to push malware and viruses to hundreds of thousands of users over the course of five years.
President Donald Trump on Saturday denied a New York Times report claiming the U.S. is ramping up cyber attacks against Russia, calling the decision to run the article a “virtual act of treason.”
As many as 50 malicious apps were discovered to have bypassed Google’s security checks and were available for download on the Google Play store, leading to many millions of installs on Android devices.
FORT LAUDERDALE, Fla. (AP) — A woman carrying two Chinese passports and a device containing computer malware lied to Secret Service agents and briefly gained admission to President Donald Trump’s Mar-a-Lago club over the weekend during his Florida visit, federal prosecutors allege in court documents.
Taiwanese computer hardware company ASUS has confirmed reports claiming that the company was used by hackers to install backdoors on customers’ computers.
Google reportedly hosted a “malware” app on its Google Play store that stole users’ cryptocurrency, leading tech site Ars Technica to claim the company “can’t be trusted to proactively keep malware out of Play.”
The credit card details from some Chili’s customers who visited the restaurant between March and April of this year have been compromised following the discovery of malware, according to a report.
A new malware attack is targeting Facebook users’ passwords and money via the Facebook Messenger app.
Intelligence analysts have discovered a new strand of North Korean malware that could be used in a cyber attack against the United States.
The Boeing corporation admitted on Wednesday that a “small number of systems” were affected by a “limited intrusion of malware,” but denounced what it called “overstated and inaccurate” reports that the malware attack was much larger.
A stealthy cryptocurrency miner hijacks Android phone processors and then pushes the devices to their literal breaking point.
Hackers are reportedly using a new form of malware that targets unsuspecting victims’ bank accounts by placing malicious links into Google’s search engine results.
Visitors to the popular porn website PornHub may have been infected by hackers who hijacked the site’s “advertising supply chain,” according to a report.
A group of hackers suspected of working in Iran for its government is targeting the aviation and petrochemical industries in Saudi Arabia, the US and South Korea, a cybersecurity firm warned Wednesday.
Hackers installed a backdoor system into the popular security application CCleaner, according to reports. Version 5.33 was issued back on August 15, and was undetected until September 13. According to Avast, the parent company of Piriform, around 2.27 million users ran the affected software.
Malware could potentially be hosted on the Federal Communication Commission’s official website due to a security vulnerability, according to a report.
A 36-year-old Chinese national named Yu Pingan was arrested at the Los Angeles airport on Monday for distributing the type of malware that was used in the raid on the U.S. Office of Personnel Management in 2014 and 2015.
SnoopWall, Inc. CEO Gary Miliefsky joined SiriusXM host Alex Marlow on Tuesday’s Breitbart News Daily to talk about the massive ransomware attack that swept the world over the weekend.
Homeland Security Advisor Tom Bossert addressed the massive ransomware attack known as “WannaCry” or “WannaCrypt” on Monday at the White House, urging businesses and individuals to use security patches to protect themselves from the unknown responsible party.
Using a tool likely stolen from the United States intelligence community, hackers launched a massive cyberattack across the world on Friday.
A Korean undergraduate student is scrambling to reverse the effects of malware he created as a joke.
A report from mobile defense specialists Skycure has identified that 71 percent of Android users have security patches that are at least two months out of date, leaving them at risk of data breaches and malware.
A report from a group of Israeli researchers claims that hackers may soon be utilising people’s speakers or headphones to listen in on conversations.
Iran has detected and removed malicious software from two of its petrochemical complexes, a senior military official said on Saturday, after announcing last week it was investigating whether recent petrochemical fires were caused by cyber attacks.
A particularly squeamish battle in the ongoing struggle between privacy and security comes from Washington State, where U.S. District Judge Robert J. Bryan has thrown out evidence in a child pornography case because the FBI will not divulge the hacking techniques it employed to obtain the evidence.
A judge has ruled that evidence obtained by the FBI with the assistance of malware is inadmissible in court, making all subsequent investigation of the case warrantless and unreasonable.
Germany’s Federal government has announced it’s new “trojan horse” computer software which will allow it to spy on citizens computers and smartphones. The German Interior Ministry has formally announced that they have created a new “Bundestrojaner” or government trojan horse
A fascinating article at the UK Register offers advice from Rob Joyce, the head of the National Security Agency’s Tailored Access Operations unit — in other words, the NSA’s chief hacker — on how to protect your network from intruders… such as, oh, let’s say the NSA’s Tailored Access Operations Unit.
Security site ‘Palo Alto Networks’ put out a warning that an iOS malware that cleverly can infect “non-jailbroken” Apple devices using enterprise certificates and private APIs has been infecting iPhones for 10 months and could herald a new era of iOS threats.
Microsoft has acknowledged that its free Skype Internet-calling, video and text service suffered a worldwide outage on September 20, 2015. The paid business users’ service is reportedly not suffering the same outages.
It will come as no surprise that Internet scam artists, quick to take advantage of every public concern, are looking to prey upon those who fear their husbands or wives might be listed in the database of Ashley Madison clients disclosed by hackers.