Digital ID

This couple lost £15,000 to scammers. We followed the money – and found millions in stolen crypto

A CyberNews investigation uncovered a network of wallet addresses used by a scammer group to store and cash out millions…

3 years ago

Tor Browser 10.5 is out, it includes a new anti-censorship feature

The Tor Project has released Tor Browser 10.5 which enhances an anti-censorship feature and warns of V2 onion URL deprecation.…

3 years ago

Crackonosh Monero miner made $2M after infecting 222,000 Win systems

Researchers have discovered a strain of cryptocurrency-mining malware, tracked as Crackonosh, that abuses Windows Safe mode to avoid detection.  Researchers from Avast…

3 years ago

Tor Browser 10.0.18 fixes a bug that allows to track users by fingerprinting installed apps

The Tor Project released Tor Browser 10.0.18 that addresses a flaw that allows sites to track users by fingerprinting the…

3 years ago

A flaw in Peloton Bike+ could allow hackers to control it

A flaw in the Peloton Bike+ could be exploited by an attacker with initial physical access to gain root entry…

3 years ago

Crypto-mining campaign targets Kubeflow installs on a large scale

Microsoft uncovered a malicious campaign targeting Kubeflow workloads to deploy TensorFlow pods that are used to mine cryptocurrency. Microsoft researchers…

3 years ago

Nearly 50,000 IPs compromised in Kubernetes clusters by TeamTNT

Researchers discovered about 50,000 IPs across multiple Kubernetes clusters that were compromised by the TeamTNT.threat actors. Researchers from Trend Micro reported…

3 years ago

Privacy Concerns On Cookies Storing Personal Information

Which are privacy concerns on the way organizations collect personal information through the use of cookies? Data is constantly being…

4 years ago

Bitcoin down: 51% attack? No, put the blame on Elon Musk

The price of Bitcoin falls after Elon Musk declared that its company, Tesla, may have sold holdings of the cryptocurrency…

4 years ago

Scheme flooding fingerprint technique may deanonymize Tor users

FingerprintJS experts devised a fingerprinting technique, named scheme flooding, that could allow identifying users across different desktop browsers, including the…

4 years ago

This website uses cookies.