In computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm. A threat can be either "intentional" (i.e. , intelligent; e.g. , an individual cracker or a criminal organization) or "accidental" (e.g. , the possibility of a computer malfunctioning, or the possibility of an "act of God" such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event.
All stories in Threat (computer)
-
How studying our reaction to coronavirus can help us fight climate change
Climate change and COVID-19 are the two most significant crises faced by the modern world – and widespread behavior change ...
-
Tesla's Autopilot dangerously fooled by drone-mounted projectors
Researchers in Israel found self-driving cars and autopilot systems can be gamed with consumer hardware and 2D image projections. ...
-
Darktrace's co-CEO on trusting AI to fight cyberattacks on our behalf
Darktrace had to take customers on a journey to help them trust algorithms in the fight against cyber attacks, the company's ...
-
Amazon Engineer: 'Ring should be shut down immediately and not brought back'
An Amazon software engineer named Max Eliaser is calling for the shutdown of Ring, the doorbell camera company Amazon paid ...
-
100 seconds to midnight: Why we're closer to Doomsday than ever
The Bulletin of Atomic Scientists, a non-profit group dedicated to monitoring the potential for global catastrophe, last ...
-
How to implement a ‘threat model’ to beef up your organization’s security
A threat model is the most effective way to take stock of your company’s security and make sure it’s continuously up-to-date. ...
-
Foreign exchange firm Travelex hit with '$6M ransomware attack'
Travelex is being held to ransom by hackers who unleashed the Sodinokibi ransomware and are reportedly requesting a $6 million ...
-
Fixing employee access should be your top security priority in 2020
Where previously, many have perceived hackers as technical threats, today many in the industry are instead looking at human ...
-
Alleged Bitcoin extortionist extradited to US for ties to 'Dark Overload' hacker crew
An alleged member of “The Dark Overload,” hacking group — which demanded Bitcoin ransom payments from victims — ...
-
Bitcoin ransomware peddlers are publicly shaming victims for not paying
Bitcoin-hungry ransomware attackers are reportedly threatening to expose victims who refuse to pay the requested cryptocurrency ...
-
[Best of 2019] NASA head warns: Expect a major asteroid impact in your lifetime
NASA administrator Jim Bridenstine thinks it’s time to start taking the threat of an Earth-altering asteroid impact seriously. ...
-
YouTube now bans 'veiled threats' against content creators
It's that time of year for looking back and seeing what happened in 2019. And given that YouTube was raked over the coals ...
-
Microsoft reveals how it caught mutating Monero mining malware with machine learning
Microsoft's antivirus division recently opened the bonnet on a mutating cryptocurrency miner and revealed how machine learning ...
-
Finland prepares for cyberwarfare after receiving 235 Bitcoin ransom threats
200 municipalities and organizations across Finland have been co-ordinating a response to a mysterious group of hackers demanding ...
-
Antivirus giants form new coalition to put an end to stalkerware
Antivirus vendors and non-profits including Avira, the Electronic Frontier Foundation (EFF), and Kaspersky have banded together ...
-
Hackers breached Macy's website and hijacked customers' payment info (Updated)
Popular US department store chain Macy's has revealed that its website was hacked with malicious scripts in an attempt to ...
-
Attackers are staging tax-themed phishing attacks to target businesses in Germany and Italy
Researchers have discovered a social engineering attack targeting organizations in Germany, Italy, and the US by delivering ...
-
Cryptocurrency is keeping FBI on its toes as director recognizes increasing threat
The director of the Federal Bureau of Investigation (FBI) has said cryptocurrencies are a "significant problem that will ...
-
Scammers favor malicious URLs over attachments in email phishing attacks
Emails containing malicious URLs made up 88 percent of all messages with malicious URL and attachments, underscoring the ...
-
Google forges new 'app defense alliance' to fix Android malware menace
Google officially announces a partnership with cybersecurity firms ESET, Lookout, and Zimperium to catch sketchy apps before ...
-
A beginner's guide to the AI apocalypse: Misaligned objectives
Welcome to the first article in TNW's guide to the AI apocalypse. In this series we'll examine some of the most popular doomsday ...
-
45,000 Android devices infected by new unremovable xHelper malware
xHelper Android malware capable of reinstalling itself even after being manually removed has reportedly infected more than ...
-
Hackers are now selling 'Raccoon' data-stealing malware as a $200 monthly service
A new kind of trojan malware is fast gaining currency among cybercriminals for its capability to steal sensitive information, ...
-
Supply chains show their weaknesses following Avast and NordVPN attacks
Antivirus solution provider Avast and VPN service NordVPN each disclosed a data breach that were traced back to a case of ...
-
It doesn’t matter ‘who’ hacked your business
For business leaders, attribution can be an unnecessary distraction – the focus needs to be on protecting against an attack ...
-
Opportunistic fraudsters use El Chapo’s son’s arrest in bid to steal Bitcoin
Opportunistic scammers are seeking to capitalize on the incident by reportedly bombarding the city's residents with threatening ...
-
Facebook’s Libra ‘cryptocurrency’ gets desperate as it considers stablecoins
Facebook's controversial 'cryptocurrency' Libra could be based on national currencies such as the dollar, the tech giant ...
-
Cryptojacking worm uses Docker to infect over 2,000 systems to secretly mine Monero
Unit 42 researchers have uncovered the first-ever instance of a new cryptojacking worm called Graboid that propagates via ...
-
New cryptomining malware uses WAV audio files to conceal its tracks
A new campaign discovered by security researchers from BlackBerry Cylance show that cybercriminals are hiding cryptojacking ...
-
Sodinokibi ransomware earns hacker $287K worth of Bitcoin in 3 days
Criminals who distributed the Sodinokibi ransomware threat earned a huge payday from victims who paid the requested Bitcoin ...
-
State-sponsored Chinese hackers have been targeting Southeast Asia since 2013
PKPLUG, a previously undocumented threat actor of Chinese origin, is behind at least six different cyber espionage campaigns ...
-
Why Facebook's AI guru isn't scared of killer robots
“But until we have a hint of a beginning of a design, with some visible path towards autonomous AI systems with non-trivial ...
-
Cybercriminals are targeting healthcare companies with phishing campaigns to steal sensitive data
Healthcare providers are facing an unprecedented level of social engineering-driven malware threats, according to new research. The ...
-
Cybersecurity vendor that protects firms from data breaches hit by data breach (Updated)
Security vendor Imperva blamed its August security breach on an AWS API key a hacker stole from an internal test database ...
-
Chinese hacking group targets Southeast Asian governments with data-stealing malware
A threat group responsible for a series of malware-based espionage attacks has been increasingly targeting the Southeast ...
-
This map connects Russia's deadly malware to the espionage groups behind them
Notorious threat actors like Potao Express, BlackEnergy and Turla account for as many as 79 unique malware families, a new ...
-
MasterMana Botnet takes over your machine to empty your cryptocurrency wallet
Cybersecurity researchers have linked this botnet to the infamous hacking crew "Gorgon Group," which is known for attacks ...
-
New Linux malware mines crypto after installing backdoor with secret master password
Skidmap specifically targets Linux systems, and researchers say its a perfect example of the increasing complexitly of crypto-mining ...
-
Fraudsters deepfake CEO's voice to trick manager into transferring $243,000
Criminals use commercially available voice-generating AI software to impersonate the boss of a German company to steal funds. ...
-
23 state agencies across Texas succumb to a 'coordinated ransomware attack' (Updated)
Texas is fighting a coordinated ransomware attack that has impacted at least twenty local government entities across the ...
-
Hostinger's database of 14 million customers' info hacked
Hostinger has forcibly reset all of its client passwords following an unauthorized access of its customer database of about ...
-
Hackers behind Texas ransomware attacks want $2.5 million
The threat actor behind the coordinated ransomware attacks in Texas may have broke into the IT software managed by an outsourcing ...
-
Researcher discloses second Steam zero-day exploit after being shut out of bug bounty program (Update: fixed in beta channel)
A second zero-day vulnerability has been publicly disclosed in Steam gaming client by security researcher Vasily Kravets ...
-
AI won't automate cybersecurity — but it'll improve the solutions we already have
Cybersecurity, a huge industry worth over $100 billion, is regularly subject to buzzwords. Cybersecurity companies often ...
-
Researchers discover malware that records users' screens when they watch porn
Researchers from antivirus developer ESET recently discovered a new form of spam-delivered malware that threatens to steal ...
-
This spooky Monero-mining malware waits to be controlled remotely
Meet 'Norman,' a powerful new strain of cryptocurrency mining malware that has cybersecurity researchers a little confused. ...
-
Chinese cyber-espionage group is extorting money from the gaming industry
Chinese state-sponsored espionage group APT41 has been covertly staging financially motivated activities targeting the video ...
-
Kazakhstan begins intercepting citizens' web traffic to 'protect them from cyber threats' (Update: It's canceled)
The Kazakhstan government has started to intercept all HTTPS traffic from all devices within its borders effective July 17, ...
-
New Android 'sex simulator' ransomware spreads via SMS messages
A new family of ransomware attacks on Google's Android mobile operating system leverages SMS to spread, according to new ...
-
'Agent Smith' malware replaces legit Android apps with fake ones on 25 million devices
Researchers from Check Point uncover new "Agent Smith" malware that replaces legitimate installed apps with malicious versions ...
-
The unforeseen trouble AI is now causing
AI has come a long way in recent years — but as many who work with this technology can attest, it is still prone to surprising ...
-
Someone spent $1.3 million on a malware-ridden laptop and I clearly don’t understand art
If you’d bought a Samsung NC10 the day it was released, the laptop would have set you back about $499. That was 11 years ...
-
This tiny flashing kit can break your bad online security habits
The number of cyber attacks is estimated to have risen by 67% over the last five years, with the majority of these data breaches ...
-
1 million crypto-jacking attempts blocked daily, despite Coinhive’s demise
The cryptocurrency mining script Coinhive may have shut down earlier this year, but many crypto-jacking scripts are still ...
-
Inside North Korea's evil masterplan to siphon Southeast Asia's cryptocurrency
A British defense think-tank warns Southeast Asia's cryptocurrency sector must act fast if it is to curb the threat posed ...
-
Game of Thrones torrents are packing a nasty surprise
Winter is coming for one of television’s most-pirated shows. On Monday, security firm Kaspersky released a new report ...
-
Cryptocurrency exchange WEX/BTC-e tied to Bitcoin ransomware hackers, report
PricewaterhouseCoopers has made a connection between the SamSam ransomware hackers and infamous cryptocurrency exchange WEX ...
-
Watch out for this new cryptocurrency ransomware stalking the web
A brand new family of cryptocurrency-fuelled ransomware has been discovered, and researchers warn it's more sophisticated ...
-
Ryuk ransomware earns hackers $3.7M in Bitcoin over 5 months
A squad of cybersecurity firms have tracked a ransomware threat known as Ryuk, which has collected over 705 BTC in just ...
-
Cryptocurrency mining malware has become self-aware (kinda)
Cryptocurrency mining malware has evolved and is now able to switch off security services to continue mining without being ...
-
Bitcoin extortionists threaten victims with 'hitman' unless they cough up $4K
Hacking seems to be too difficult these days and old-fashioned extortion threats are becoming the way of the crypto-criminal. ...
-
Post-WannaCry: Only 3% of companies are prepared for new types of cyberattacks
One year ago, my phone lit up with the first text alert about the WannaCry ransomware attack. From the onset, it was clear ...
-
6 reasons why municipalities are getting hammered by cyberattacks
More and more municipalities are becoming victims of hacks. For example in the US, the first half of 2018 has seen many major ...
-
Twitter CEO's comments will ignite the right, context be damned
Stripped of context, Twitter CEO Jack Dorsey's comments sound a bit like an admission. Speaking to members of congress, Dorsey ...
-
This underwater death machine has one mission: Destroy the starfish
Australia's Great Barrier Reef is dying. Decades of human intervention have left the UNESCO World Heritage site reeling from ...
-
Blockchain doesn't kill people, but smart contracts can, law professor says
Smart contracts, like the ones featured by Ethereum’s blockchain, represent simple machine intelligence, and one academic ...
-
Major cryptocurrency exchange delists Bitcoin Gold following $18M hack
A major cryptocurrency exchange is delisting Bitcoin Gold after a series of debilitating heists amounting to over $20 million ...
-
EU suggests law to stop Cambridge Analytica-style election meddling
The European Commission is currently working on a proposal which will impose fines on political parties using Cambridge Analytica-style ...
-
Over 50k people have blocked Twitter's biggest advertisers over the Alex Jones debacle (and you can too)
Alex Jones can't win these days. As the unofficial mascot of conspiracy theorists everywhere, Jones -- the man who answers ...
-
Bitcoin dev finds potentially crippling security flaw in Bitcoin Cash
A massive security vulnerability was found in Bitcoin Cash that, if exploited, would have crippled its blockchain with a ...
-
White House earmarks over $1B for quantum technology research
Recent bipartisan efforts from the US House of Representatives and Senate have led to the formation of a subcommittee to ...