News

News (2850)

Ransomware is a pain in the ass, no matter what type it is. You have a piece of code that comes in, encrypts all your files, steals them and then you must deal with paying a ransom of some sort…
There you are doing your stollen credit card number shopping, like you do every Sunday. You come across a big batch of them, and the deal seems good. How do you know these things are real? I mean this isn’t…
DLL sideloading is a common technique for attackers to use when getting their malware in place and has been in use since around 2010. Simply put your malicious DLL in the same directory as the application and Windows in all…
There is an old adage that says compliance is not a substitute for security. You can check all the compliance check boxes, pass audits, and still end up with an insecure environment. Level Finance Crypto found this out the hard…
A recent incident where ChatGPT users at Samsung unknowingly exposed sensitive data via ChatGPT has raised concerns in multiple industries. The banking and finance industry saw several companies put a stop on the use of ChatGPT and certain regulators began…
T-Mobile has disclosed their second breach of 2023. According to the mobile provider a threat actor gained access to their systems in February and was not detected until March. This allowed the attacker access to a small amount of customer…
Although not a new story the recent revelations around the CFPB (Consumer Financial Protection Bureau) data breach are very important. This incident is one of those times when you can either learn an important lesson, or you can ignore it…
It seems that PC makers are not happy with the Intel’s Management Engine (IME) and the flaws that keep being found in it. The original flaw allowed attackers a clean way to compromise a system including uploading malware and exfiltrating…
You have probably seen a message, or email, or even a recent Facebook post claiming that a dangerous Facebook Hacker by the name of Jayden K Smith working his way through the Facebook community and hacking user accounts with ease.…
Hate is a powerful item and when it spills out it can be violent, rude and many other things. Because of the power of hate found in images, media, mems, etc., many have wondered why there are not more efforts…
Thursday, 29 June 2017 15:44

What was uncle Petya really doing?

Written by
For the last couple of days the world has been buzzing with news about the Petya malware. When the news of the outbreak broke on Tuesday morning, it was all about a new ransomware that was spreading around the globe.…
In the early 2000s AMD was on top of the world, they had a desktop processor that was what everyone wanted. AMD was handily beating Intel in terms of performance and pushing x86-64 computing out to the world. In 2006…
Remote management and access tools are great things for IT staff to use, but if they are not set up correctly or they have bugs hidden in the code they can quickly become a nightmare. Intel’s AMT (Active Management Technology)…
CD Projekt RED has found themselves the victim of both data theft and now blackmail. At least that is what we are hearing from their Twitter account. According to CD Projekt, someone has made off with information that relates to…
Monday, 09 January 2017 09:28

AMD shoots for relevancy in 2017 with Ryzen

Written by
Since the ATi purchase AMD has struggled with trying to compete in the CPU market. They have tried many different strategies and approaches. One even included distancing themselves from the performance market and focusing solely on mobile. This disastrous strategy…
It seems that AMD’s recent licensing moves and the press that Zen has been getting has given investors more confidence in the company. On Friday this confidence pushed AMD’s share price by almost 10% at $6.18 (the 52 week high)…
Page 6 of 179