Data from five million credit and debit cards was put up for sale on the dark web last March 28. Security researchers investigating the sale traced the data back to Saks Faith Avenue and other stores under the Hudson's Bay company.
SAMSAM ransomware is suspected to hit systems used by the city of Atlanta's local services, causing outages on customer facing applications, including some that customers may use to pay bills or access court-related information.
Orbitz, a travel booking website owned by Expedia, has been found with signs of a major data breach that may have exposed 880,000 customer credit card records.
A post in a predominantly Russian-language dark web forum was reportedly selling a data dump with records that had an unusual "extra" bit of data: each record included a selfie of the user.
An Android adware named RottenSys has reportedly affected nearly 5 million Android devices since 2016, with the capability to turn affected devices into becoming part of a botnet.
Security researchers uncovered a traffic distribution system (TDS) being advertised as a service in the dark web. Named “BlackTDS,” the TDS is used to deploy malware and redirect would-be victims to exploit kits.
After monitoring and detecting suspicious domains—now what? Affected businesses should deactivate them so fraudsters won’t be able to use them for their schemes. Here's how it can be done.
MIT's recent research delved into 126,000 stories tweeted by around 3 million accounts from 2006 to 2017 and found that fake news spread faster and were more likely to be retweeted than true stories.