Online gambling platform DraftKings has been hit by a credential stuffing attack in which attackers managed to break into users’ accounts and steal some $300,000. Credential stuffing uses previously leaked email addresses and passwords to gain automated account access. Attackers check whether they can also log in to website B with credentials stolen from website […]
In the Swiss city of Zurich, a hacker broke into various digital information boards on Tuesday to play porn videos on them. Information boards normally show departure times of trams and buses, now travelers using public transport were confronted with images from the Pornhub website. It is still unknown which smart bastard is behind the […]
A hacker remotely accessed the computer system the operator was monitoring that controls chemical levels in the water as well as other operations. The operator observed the mouse moving around on the screen to access various systems that control the water being treated. The hacker tried to poison the town’s water supply by raising the […]
The CBS of the Netherlands (Statistics office of the Netherlands) investigated how internet users from aged 12 or older take measures to protect their personal data on the internet. According to this survey, in which fa. 6,500 people took part of it, 90 percent said they had taken measures to protect their personal information on […]
A criminal organisation set up shell companies in the United States and opened bank accounts for these companies. To gain the trust of the financial institutions, members of the criminal network made transfers to the US-based accounts from different locations in the EU. Based on this trust, the American-based banks issued debit and credit cards […]
Windows Remote Desktop servers are now used to amplify DDoS attacks. A IT professional knows how to avoid this, he or she should install an independent zero trust solution that not only protects your RDP services, but also eliminates complexity wherever the service is hosted. It acts as a smart central bastion and implements Role […]
The encrypted email service Tutanota has been the target of DDOS attacks for over a month, preventing users from using the service for several days. The attacks began in mid-August and the attackers kept changing their attack vector, Tutanota said. Last weekend, the e-mail service came under fire again and this week it was busy […]
According to Dutch magazine Vrij Nederland (VN), in 2016 three ethical hackers known only as Edwin, Mattijs and Victor, scoured through the password database with the username of Donald Trump’s email address which had leaked out of LinkedIn a few years before. With the helpf of the program John the Ripper – a tool that […]
To protect accounts related to the US presidential election, Twitter will require a strong password for these accounts. These users are also recommended to set up two-factor authentication. The microblogging service has announced this on its own website. In this way, Twitter wants to protect so-called “high-profile accounts” during the upcoming presidential elections. These include […]
A new survey by research firm Vanson Bourne of 1,350 business IT decision-makers in the US and 13 other countries sought to identify current IoT security vulnerabilities and threats in corporate organizations. One of the questions was a question that asked respondents to identify the strangest IoT devices they found connected to their organization’s networks. […]
- 1
- 2