It’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and...
More and more devices now connect to the internet than ever before. This is the Internet of Things. They can be convenient, entertaining and useful, but such devices are a well-documented potential security threat. People may drop their guard if they have a seemingly...
New Developments in ATM Hacks Malware that targets ATMs isn’t a new concept. After all, ATMs use internal computers that can be hacked like any workstation. The prime difference is that ATMs dispense cash, which has to be picked up in person but is then...
Have you ever wondered what hackers do with all of the data they steal on a regular basis? Sure, they could go public with it like they did with the Ashley Madison and Sony hacks, or they could sell it and make some quick cash. Credentials like passwords, usernames,...
If you feel that there’s an increase in ransomware activity, don’t worry; it’s not just you. Hackers are now taking greater advantage of ransomware, a threat that locks down files and returns them in exchange for a payment. This is wreaking havoc on the computing...
Since the dawn of the computing age, hackers have taken advantage of all sorts of tactics in order to crack systems and ruin lives. With the Internet of Things bringing connected devices from all over the place into the mix, there are more opportunities than ever to...