Gain unauthorized access to data in a system or computer.

Posts

Word-based Malware Attack Doesn’t Use Macros

Malicious e-mail attachments used in this campaign don’t display any warnings when opened…

Romance Scams Drive Necurs Botnet Activity in Run Up to Valentine’s Day

Emails try to get recipients to share revealing photos of themselves so scammers…

U.K. and U.S. Government Websites Among Thousands Infected by Cryptocurrency Miner

The attack could have been averted through a technique called subresource integrity, according…

Cisco Confirms Critical Firewall Software Bug Is Under Attack

Cisco has issued patches for the vulnerability, which could be up to seven…

New Western Digital My Cloud Bugs Give Local Attackers Root on NAS Devices

Two new WD My Cloud vulnerabilities have been identified, adding to last month’s…

Intel Halts Spectre/Meltdown Patching for Broadwell and Haswell Systems

Widespread reports of reboot issues on some Intel systems force the chip giant…

Hacker Infects Gas Pumps with Code to Cheat Customers

Russian authorities have broken up a crime ring involving a hacker and willing…