Vulnerability (computing) A laser pointer can trick your smart devices into opening your doors, starting your car Bryan Clark 5 years ago
Email Scammers favor malicious URLs over attachments in email phishing attacks Ravie Lakshmanan 5 years ago
Research A new hack uses lasers to send inaudible commands to your Amazon Echo Ravie Lakshmanan 5 years ago
Attack (computing) Spanish IT firm infected with ransomware in continued attacks on supply chains Ravie Lakshmanan 5 years ago
WhatsApp WhatsApp spyware was used to snoop on 2 dozen Indian activists and journalists (Updated) Ravie Lakshmanan 5 years ago
Microsoft Microsoft: Russian hackers are trying to derail the 2020 Summer Olympics Ravie Lakshmanan 5 years ago
Security Hackers give Johannesburg government 3 days to pay over $30K in Bitcoin Yessi Bello Perez 5 years ago
Attack (computing) Supply chains show their weaknesses following Avast and NordVPN attacks Ravie Lakshmanan 5 years ago
Attack (computing) New cryptomining malware uses WAV audio files to conceal its tracks Ravie Lakshmanan 5 years ago