OPINION

The Dilithium Crystals Might Be Melting

For those born after the mini-computer era (co-terminus with the original Star Trek), dilithium is the fuel used to power a warp core propulsion system needed for interstellar travel. Dilithium is both naturally occurring and rare, and when it melts, from overuse of the warp core, the starship is ba...

A new fraud ring called Proxy Phantom is using sophisticated credential stuffing attack methods to take over customer accounts for U.S.-based e-commerce merchants. The latest research from digital trust and safety firm Sift demonstrates fraudsters' relentless innovation and reinforces retailers' nee...

While migration to the cloud is at an all-time high, so is the growth of ransomware peddlers. Veritas Technologies surveyed more than 2,000 global IT leaders whose organizations have undertaken pandemic-led digital transformation. The study found the majority are severely vulnerable to ransomware at...

The research by Malwarebytes, Digitunity and the Cybercrime Support Network based on a survey of 5,000 people in the United States, United Kingdom and Germany found that Black people, Indigenous people, and People of Color (BIPOC) are more likely to have their identities stolen than White people, 21...

Positive Technologies has released a report that indicates ransomware attacks have reached "stratospheric levels." The report finds ransomware assaults now account for 69 percent of all attacks involving malware. That is among the most disturbing findings. The research also reveals that the volume ...

Shadow code -- third-party scripts and libraries often added to web applications without security validation -- pose risks to websites and jeopardize compliance with privacy regulations, according to new research conducted by Osterman Research for PerimeterX. Third-party code leaves organizations vu...

High ranking business executives say ransomware is a major concern to them but their organizations are unprepared to do anything about it. Those were the findings of a poll released Monday by global consulting and advisory services firm Deloitte.

The "Linux Threat Report 2021 1H" from Trend Micro found that Linux operating systems are heavily targeted for cyberattacks, with nearly 13 million detections in the first half of this year. As organizations expand their footprint in the cloud, correspondingly, they are exposed to the pervasive thre...

Disruptions to power grid systems can have devastating effects. Despite the fact that consistent electric power has been a basic human need for more than a century; more than ever, the grid faces a growing onslaught of threats. We spoke with experts in the field about the critical nature of the grid...

The hacker who stole US$600 million in tokens from a cryptocurrency platform last week has been offered a security job by the platform. Most of the money has been returned to the Poly Network, but more than $200 million in assets remains locked in an account controlled by the hacker, whom the crypto...

Bitdefender security researchers have uncovered a Romanian-based threat group active since at least last year targeting Linux-based machines with weak Secure Shell Protocol (SSH) credentials. The researchers discovered the group was deploying Monero mining malware used to steal cryptocurrency.

In addition to its condemnation of China, the White House announced that the U.S. Justice Department has filed charges against four Ministry of State Security hackers allegedly engaged in a multiyear campaign targeting foreign governments and entities in key sectors, including maritime, aviation, de...

Ransomware gangs are increasingly turning to specialists to complete their capers on corporations, according to a Dark Net intelligence provider. A report issued by Tel Aviv-based Kela noted that the days when lone wolves conducted cyberattacks from start to finish are nearly extinct, as the one-man...

Thousands of hacker attacks were launched on a network of smart home devices designed by researchers to assess the risk the gadgets pose to consumers. During the initial week the "honeypot" network was online, 1,017 unique scans or hacking attempts were directed at the devices on the net, which incl...

E-Commerce Times Channels