Skip to content
  • News
    • TNW Conference June 19 & 20, 2025
    • All events
  • Spaces
  • Programs

  • Newsletters
  • Partner with us
  • Jobs
  • Contact
News news news news
  • Latest
  • Deep tech
  • Sustainability
  • Ecosystems
  • Data and security
  • Fintech and ecommerce
  • Future of work
  • Conference media hub
    • Startups and technology
    • Investors and funding
    • Government and policy
    • Corporates and innovation
    • Podcast

All Articles for

Attack (Computing)

In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset.

A laser pointer can trick your smart devices into opening your doors, starting your car
  • Vulnerability (computing)

A laser pointer can trick your smart devices into opening your doors, starting your car

  • Bryan Clark
  • 5 years ago
Scammers favor malicious URLs over attachments in email phishing attacks
  • Email

Scammers favor malicious URLs over attachments in email phishing attacks

  • Ravie Lakshmanan
  • 5 years ago
A new hack uses lasers to send inaudible commands to your Amazon Echo
  • Research

A new hack uses lasers to send inaudible commands to your Amazon Echo

  • Ravie Lakshmanan
  • 5 years ago

Spanish IT firm infected with ransomware in continued attacks on supply chains
  • Attack (computing)

Spanish IT firm infected with ransomware in continued attacks on supply chains

  • Ravie Lakshmanan
  • 5 years ago
WhatsApp spyware was used to snoop on 2 dozen Indian activists and journalists (Updated)
  • WhatsApp

WhatsApp spyware was used to snoop on 2 dozen Indian activists and journalists (Updated)

  • Ravie Lakshmanan
  • 5 years ago
Microsoft: Russian hackers are trying to derail the 2020 Summer Olympics
  • Microsoft

Microsoft: Russian hackers are trying to derail the 2020 Summer Olympics

  • Ravie Lakshmanan
  • 5 years ago
Hackers give Johannesburg government 3 days to pay over $30K in Bitcoin
  • Security

Hackers give Johannesburg government 3 days to pay over $30K in Bitcoin

  • Yessi Bello Perez
  • 5 years ago
Supply chains show their weaknesses following Avast and NordVPN attacks
  • Attack (computing)

Supply chains show their weaknesses following Avast and NordVPN attacks

  • Ravie Lakshmanan
  • 5 years ago
It doesn’t matter ‘who’ hacked your business
  • Business

It doesn’t matter ‘who’ hacked your business

  • J.J. Thompson
  • 5 years ago
New cryptomining malware uses WAV audio files to conceal its tracks
  • Attack (computing)

New cryptomining malware uses WAV audio files to conceal its tracks

  • Ravie Lakshmanan
  • 5 years ago
Previous Page Next Page

The heart of tech


More TNW

  • Media
  • Events
  • Programs
  • Spaces
  • Newsletters
  • Jobs in tech

About TNW

  • Partner with us
  • Jobs
  • Terms & Conditions
  • Cookie Statement
  • Privacy Statement
  • Editorial Policy
  • Masthead

Copyright © 2006—2025, The Next Web B.V. Made with <3 in Amsterdam.