The 20-Year Hunt for the Man Behind the Love Bug Virus

The 20-Year Hunt for the Man Behind the Love Bug Virus

He’d been accused of unleashing the Love Bug , a high-profile and extremely successful virus that had infected an estimated 45 million computers worldwide and caused billions of dollars’ worth of damage.

Chinese Hackers Charged in Decade-Long Crime and Spying Spree

Chinese Hackers Charged in Decade-Long Crime and Spying Spree

Dong would research victims and how they might be exploited; Li did the dirty work of compromising the networks and exfiltrating the data.Not to mention a hit list that included multiple videogame and pharmaceutical companies, an educational software firm, Covid-19 research, and hundreds of other victims worldwide.

Iranian Spies Accidentally Leaked Videos of Themselves Hacking

Iranian Spies Accidentally Leaked Videos of Themselves Hacking

They show the hackers accessing compromised Gmail and Yahoo Mail accounts to download their contents, as well as exfiltrating other Google-hosted data from victims.A screenshot from a leaked video of Iranian hackers demonstrating how to exfiltrate emails from a Yahoo account using the email management tool Zimbra.

Google Recalls Titan Security Key Over a Bluetooth Flaw

Google Recalls Titan Security Key Over a Bluetooth Flaw

With the right timing, she could trick the victim's laptop, for instance, into pairing with her own Bluetooth dongle rather than the Titan key, thus gaining access to both a user's Google account and that computer.

Mysterious Hackers Hid Their Swiss Army Spyware for 5 Years

Mysterious Hackers Hid Their Swiss Army Spyware for 5 Years

Shulmin says Kaspersky hasn't yet been able to connect TajMahal, named for a file the spyware uses to move stolen data off a victim's machine, to any known hacker groups with the usual methods of code-matching, shared infrastructure, or familiar techniques.

An IOS App That Secretly Spies on You, And More News

An IOS App That Secretly Spies on You, And More News

Say hello to your new speaker-lamp. A cervix-navigating robot could save the rhinos. To be fair, these rhinos will need a lot more than a cervix-navigating robot to survive.

A Guide to LockerGoga, the Ransomware Crippling Industrial Firms

A Guide to LockerGoga, the Ransomware Crippling Industrial Firms

LockerGoga, which was named for a file path in its source code by security research group MalwareHunterTeam, remains relatively rare and targeted compared to older forms of ransomware like SamSam and Ryuk, says Charles Carmakal, who leads a team of incident responders at FireEye who have dealt with multiple infestations.