Blog

Suspected LeakedSource operator charged in Canada

The for-profit breach notification site offered access to approximately three billion identity records.       By Charlie OsborneJanuary 16, 2018 File Photo       The Royal Canadian Mounted Police (RCMP) have announced charges against Jordan Evan Bloom for operating the LeakedSource for-profit data breach website. On Monday, the law enforcement agency said that…
Read more

$400,000 stolen in Lumens BlackWallet theft

Another day, another theft in the world of cryptocurrency wallets.     By Charlie OsborneJanuary 16, 2018       Unknown threat actors have compromised the BlackWallet application and stolen $400,000 in user funds. Over the weekend, as reported by Bleeping Computer, a DNS server connected to the domain of browser-based wallet application BlackWallet was…
Read more

Ericsson to power Dallas smart city traffic solutions

Ericsson will provide its Connected Urban Transport solution for the City of Dallas' Advanced Traffic Management System to monitor, manage, and maintain systems and performance and share data.       By Corinne Reichert | January 9, 2018     Ericsson has announced that it will provide the technology behind a smart cities traffic solution…
Read more

How to hack public Wi-Fi to mine for cryptocurrency

A new attack called CoffeeMiner can exploit public Wi-Fi services to secretly mine cryptocurrencies.        By Charlie OsborneJanuary 8, 2018 File Photo       A researcher has published a proof-of-concept (PoC) project called CoffeeMiner which shows how threat actors can exploit public Wi-Fi networks to mine cryptocurrencies. Last week, a software developer called…
Read more

Four ways to run Windows 10 on your Mac

People are buying new Macs at the rate of around 4 to 5 million every quarter, but it seems that many users still can't make a total break from Windows. Here's a look at how you can run Windows 10 on your Mac alongside the macOS operating system.     By Adrian Kingsley-HughesJanuary 8, 2018…
Read more

This Android malware mimics Uber to steal your login and password

The FakeApp trojan has returned with new tricks to stop users noticing they've been duped.          By Danny Palmer | January 4, 2018   The malware users a fake Uber overlay to steal user credentials. Image: Getty             Uber users with Android smartphones are being targeted with malware…
Read more

PyCryptoMiner enslaves your PC to mine Monero

The botnet's creator is quietly cashing in on the craze for cryptocurrency.     By Charlie OsborneJanuary 4, 2018       Researchers have stumbled across a new botnet which has gone under the radar for a long time while quietly enslaving PCs in the quest for cryptocurrency. On Wednesday, researchers from F5 Networks revealed…
Read more