On April 10, Sierra Tel discovered that its IoT device modems had been bricked, possibly by a vigilante trying to neutralize rogue devices.
Hajime appears to have been created by a vigilante that is attempting to improve IoT device security and help IT decision-makers tighten defenses.
Hacked site numbers continue to increase, according to Google. Businesses must take steps to ensure their online properties are safe and secure.
Bug bounty programs are now paying out more to white-hat hackers, but they're also tightening regulations on payments and structure.
The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
A recent survey revealed that hackers can bypass security controls in under 12 hours. How can companies protect critical systems and eliminate new threats?
A new Metasploit hardware bridge enables IT professionals to hack their own hardware, reducing the complexity of device-based vulnerability testing.
An anonymous actor compromised mobile phone hacking company Cellebrite and stole 900 GM of potentially compromising information.
'Twas the hack before Christmas, the time late December. While IT professionals are home with family members, cybercriminals are planning their next moves.
This list of notable 2016 data breaches can serve as a cheat sheet for a security professional who is pressed for the latest tech news during the holidays.