According to a new U.K.-based study, 100 percent of test spear phishing attacks gained access to sensitive university data in less than two hours.
The first quarter of 2018 saw a rise in cybersecurity threats such as ransomware, Internet of Things (IoT) vulnerabilities and zero-day threats.
On April 10, Sierra Tel discovered that its IoT device modems had been bricked, possibly by a vigilante trying to neutralize rogue devices.
Hajime appears to have been created by a vigilante that is attempting to improve IoT device security and help IT decision-makers tighten defenses.
Companies have a vested interest when it comes to ferreting out IT problems before cybercriminals manage to launch attacks in the wild. The recent Mirai infections are proof positive that compromised Internet of Things (IoT) devices paved the way...
The White Team revealed themselves to be the developers behind Linux.Wifatch, the vigilante malware that was protecting routers from attacks.
Self-hacking may be the next big thing in IT security, but can thinking like cybercriminals really help professionals defend corporate networks?
To win the war against black hat developers, white hats must collaborate with each other and their customers to share threat intelligence.
Security researchers are invited to submit vulnerability reports and a functioning exploit in return for cash as part of the Microsoft bug bounty program.
Black and white hat hackers may be the most well-known types, but a third kind of hacking focuses on solving math problems to help develop the cyberdomain.