Coinbase Will Reimburse Customers Up to $400 Million After Data Breach

As analysts and governments around the world continue to call attention to North Korean digital fraud, researchers this week published ...
Read more
‘Stupid and Dangerous’: CISA Funding Chaos Threatens Essential Cybersecurity Program

In an eleventh-hour scramble before a key contract was set to expire on Tuesday night, the United States Cybersecurity and ...
Read more
End-to-End Encrypted Texts Between Android and iPhone Are Coming

Knifings, firebombings, shootings, and murder-for-hire plots—all linked to a splinter group of the 764 crime network called “No Lives Matter.” ...
Read more
The Official DOGE Website Launch Was a Security Mess

As well as being insecure, the DOGE website heavily leans on X, the social media platform owned by Musk. DOGE’s ...
Read more
Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
.gif?w=1146&resize=1146,600&ssl=1)
Schools have faced an onslaught of cyberattacks since the pandemic disrupted education nationwide five years ago, yet district leaders across ...
Read more
The Worst Hacks of 2024

Every year has its own mix of digital security debacles, from the absurd to the sinister, but 2024 was particularly ...
Read more
You Need to Create a Secret Password With Your Family

Scammers are out of control. Every year, fraudsters and cybercriminals make billions by tricking people into parting with their cash. ...
Read more
A New Phone Scanner That Detects Spyware Has Already Found 7 Pegasus Infections

In recent years, commercial spyware has been deployed by more actors against a wider range of victims, but the prevailing ...
Read more
Chinese Hackers Target Trump Campaign via Verizon Breach

The Chinese language spy operation provides to the rising sense of a melee of international digital interference within the election, ...
Read more
Hacker Charged With Seeking to Kill Using Cyberattacks on Hospitals

In December of 2023, for example, Nameless Sudan took OpenAI’s ChatGPT offline with a sustained sequence of DDoS assaults in ...
Read more