INTERVIEW Hacking an airport conjures mental images of Bruce Willis blockbusters, hijacked planes, and a moody hacker-in-a-hoody wreaking havoc from some undisclosed location. But in reality, securing...
Facebook has announced the rollout of end-to-end encrypted Messenger voice and video calls five years after making it available in one-on-one text chats. End-to-end encryption (E2EE)...
EXLCUSIVE – The El_Cometa ransomware gang, formerly known as SynAck, has released today master decryption keys for the victims they infected between July 2017 and early...
UNC215, a Chinese cyber-espionage group, is behind multiple intrusion activities aimed at Israeli organizations, revealed experts. These attacks have been targeting IT services, government institutions, and...
A new variant of AdLoad malware is capable of bypassing Apple’s built-in antivirus tech XProtect to infect macOS. XProtect is Apple’s YARA signature-based solution used for...
TORONTO — The personal information of more than three thousand children in daycares throughout Durham Region was stolen in a cyberattack early this year that CTV...
The eCh0raix ransomware is now updated to target two vendors’ devices that are mostly used in Single Office and Home Office (SOHO) setups. Earlier, the ransomware...
A new malware named Chaos has been discovered on an underground forum for testing purposes. It has been in development since June and may be released...
The Pakistan-linked threat group’s campaign uses compromised WordPress sites to deliver the Warzone RAT to manufacturing companies in Taiwan and South Korea. Threat actors are using...
The company will use some clever math to sniff them for instances of child abuse without looking at the photos. The proliferation of child sexual abuse material on...