Weak security defaults enabled Squarespace Domains hijacks of former Google Domains accounts ~tech security.cyber google.domains Article 729 words 19 votes
CEO of data privacy company Onerep.com (used by the Mozilla Monitor service), founded dozens of people-search firms ~tech privacy Article 1569 words 44 votes
Hackers claim they breached T-Mobile more than 100 times in 2022 ~tech Article 2329 words, published Feb 28 2023 8 votes
18-year-old member of online harassment group sentenced to five years in prison after "swatting" the owner of a desirable Twitter handle, resulting in a fatal heart attack ~tech social media Article 1275 words 31 votes
We infiltrated a counterfeit check ring! Now what? ~finance Article 1436 words, published Jun 30 2021 12 votes
Western Digital urges users to disconnect unsupported MyBook Live external hard drives from internet, after drives start being wiped remotely using vulnerability reported three years ago ~tech security internet Article 640 words 14 votes
US Department of Justice recovers $2.3 million worth of Bitcoin that Colonial Pipeline paid to ransomware extortionists ~tech security.cyber Article 883 words 17 votes
DarkSide ransomware gang quits after servers, Bitcoin stash seized ~tech security.cyber Article 577 words 17 votes
A closer look at the DarkSide ransomware gang, which was responsible for the recent attack on Colonial Pipeline ~tech security.cyber Article 1381 words 15 votes
At least 30,000 US organizations newly hacked via holes in Microsoft’s email software ~tech microsoft security Article 1016 words 19 votes
FBI, DHS, HHS warn of imminent, credible ransomware threat against US hospitals ~tech Article 678 words 13 votes
QAnon/8Chan sites briefly knocked offline after call to internet provider ~tech social media Article 759 words 15 votes
Why and where you should plant your flag ~tech security Article 1925 words, published Aug 12 2020 12 votes
A timeline of Wednesday's epic Twitter hack, and some clues about who may have been behind it ~tech security social media Article 1437 words 19 votes
Turn on multi-factor authentication before crooks do it for you ~tech security Article 973 words 19 votes
Microsoft buys Corp.com so bad guys can’t ~tech security microsoft internet Article 1041 words 17 votes
zWarDial, an automated tool to find unprotected Zoom meetings ~tech security Article 1411 words 7 votes
The case for limiting your browser extensions ~tech security privacy browsers Article 1401 words 9 votes
Breach in payment-processing systems at Wawa convenience stores may have compromised over thirty million cards ~finance Article 1409 words 5 votes
"Satori" Internet-of-Things botnet operator Kenneth Currin Schuchman pleads guilty ~tech security Article 849 words 5 votes
What you should know about the Equifax data breach settlement ~tech privacy Article 1534 words 16 votes
What you should know about the Equifax data breach settlement ~tech privacy Article 1534 words 7 votes
Marcus “MalwareTech” Hutchins pleads guilty to writing, selling banking malware ~tech security.cyber Article 588 words 6 votes
Facebook stored hundreds of millions of user passwords in plain text for years ~tech facebook security social media Article 682 words 27 votes
In-browser cryptocurrency mining service Coinhive will shut down on March 8 ~tech Article 742 words 17 votes
Bomb threat, sextortion spammers abused weakness at GoDaddy.com ~tech security Article 2060 words 7 votes
Supply chain security is the whole enchilada, but who’s willing to pay for it? ~tech security Article 2161 words 13 votes
Plant your flag, mark your territory - "If you don’t plant your flag online, fraudsters and identity thieves may do it for you" ~tech security internet Article 1381 words 14 votes