The final ten teams of the 2017 Industrial Cybersecurity Skills Competition have been revealed after a three-day event. Highlights include the 'GSEC' team from
Discover how the former CIA employee Edward Snowden's Haven application can monitor your laptop through your smartphone. Learn about its features like motion de
A Washington man was sentenced to 37 months in prison for threatening a North Carolina healthcare company with a cyber attack unless they fired an employee and
Explore the top 10 most severe cyber attacks ever, including major hacks on government agencies, Sony Pictures, and financial institutions. Discover how these i
Five Romanian hackers arrested for breaching Washington government surveillance cameras using CTB-Locker and Cerber ransomware. Learn about the international co
Learn how researchers from Nanyang Technological University used sensor data and machine/deep learning to guess smartphone PIN codes with 99.5% accuracy. Unders
A hacker group that illegally entered the Henan Construction Department's website and added false builder credentials has been dismantled. Learn more about this
Learn about the Digmine cryptocurrency mining malware spreading through Facebook Messenger. Understand how it infects users and the steps to avoid it for better
Trend Micro predicts three major cyber attack methods for 2018: digital ransom, IoT vulnerabilities exploitation and blockchain attacks. Learn more about these
This article discusses the cyber attack on an Austrian hotel and highlights the risks of IoT devices. Learn about the challenges in protecting against such atta