0 0 0

6 reasons chip hacks will become more popular

An interesting piece on why firmware and chip hacks will rise

1.     More security will be driven at the chip level

2.     Hardware hacks...

Read More…
unknownx500

0 1 0

Bitcoin's murkier rivals line up to displace it as cybercriminals' favourite

Reuters digs into how cyber criminals are developing new and more complex money-laundering methods using newer techniques and unregulated...

Read More…
unknownx500 komersreal

0 1 2

Former IBM engineer admits stealing source code

Insider threats are real. The worrying aspect of this story is the fact that Xu had worked for IBM for about 4 years, thats a long time...

Read More…
unknownx500

0 0 1

HSBC voice ID authentication foiled

Biometrics are increasingly being used to ease and facilitate authentication. But they require a lot of tuning to reach an acceptable...

Read More…
unknownx500

1 0 0

Pirates of the Caribbean hacked

Ransomware has given criminals a whole new revenue stream. Lock files on computers and demand a ransom. Steal files and demand a ransom...

Read More…
unknownx500

0 0 0

DocuSign forged

Electronic signature company DocuSign has been compromised with criminals sending phishing emails that appear to be legitimate.

The attack...

Read More…
unknownx500

0 0 0

Large scale ransomware attack against UK hospitals

Initial reports don't look good with many hospitals and healthcare trust affected. 

While it's too early to say for sure, the ransomware...

Read More…
unknownx500

0 0 1

How the French were prepared for hackers

Whoever was behind the hacking of the now French president is a topic that will likely be pondered over for years.

However, the techniques...

Read More…
unknownx500

0 0 0

Staples hires its first CISO

Staples hasn't avoided data breaches in the past, yet this is the first time the company has appointed a CISO.

Brett Wahlin comes with...

Read More…
unknownx500

0 0 0

Hackers loot bank accounts with SS7 TFA flaw

The risk has been known for several years now, but it was believed to be low. 

Many other similar risks exist in technology today. But the...

Read More…
unknownx500

0 0 0

How cybercriminals are using social media

It's not that surprising to see cybercriminals increasingly leveraging social media to gain information on their targets. 

On one hand...

Read More…
unknownx500

1 1 3

Huge Google Phish

There was a lot of buzz as many people received phishing emails disguised as invitations to open a Google Doc. By authorising it, users...

Read More…
unknownx500

As a free user, you can follow Passle and like posts.

To repost this post to your own Passle blog, you will need to upgrade your account.

For plans and pricing, please contact our sales team at sales@passle.net

Repost successful!

View the repost

Repost successful!

Your repost is currently a draft. Review your repost and request approval.

Something went wrong whilst reposting - please try again.

Sorry - this is not an option. This post already exists in the Passle you have selected.

Try reposting to another Passle.