This is why spelling counts. If it weren’t for a careless typo hackers who recently targeted Bangladesh Central Bank and the New York Fed could have stolen upwards of (sit down for this) $1 billion. Yes, that’s “Billion” with a “B”. As it is, they only got away with somewhere around $101 million. Only.
Petronella Blog Archive
If you were looking to Staminus Communication Inc for protection against DDoS attacks, you might want to consider looking somewhere else. The Internet hosting provider that specializes in distribute denial of service (DDoS) protection, has itself been hacked, knocking Staminus’s entire network completely offline for more than 20 hours.
This has not been a good week for Mac users who thought OS X was immune to malware attacks. With the revelation that Apple users are at risk for being held hostage by a particularly nasty form of malware known as ransomware, we thought it would be a good idea to give everyone a rundown of the latest developments and what you can do to protect yourself going forward.
A security firm, Palo Alto Networks, is confirming reports of hackers finally finding a way to install ransomware on Macs in order to take over computers and extort money from users. While ransomware has been affecting Windows users for years, this is the first example of it attacking OS X devices.
After we recently ran an article warning of the dangers of W-2 Spoofing, it appears hackers have been busy. Recently, there have been security breaches at several major companies including Snapchat, Alaskan ISP and telecom provider, CGI, and Seagate Technology, which specializes in data storage.
It appears that hackers have once again upped their game when it comes to ransomware. Now not only are your files held hostage until you pay up, it comes with a creepy voice message directly from the hackers themselves.
The arrest of a senior Facebook executive in Brazil after encrypted data sent through WhatsApp was unable to be retrieved may not just be a sign of frustration among the world’s law enforcement agencies, but a sign of the lengths they may be willing to go to break cryptography and gain access to encrypted data.