Hackers are offering Borat RAT for sale on underground forums. The malware allows almost complete control of a system. Its functions range from keyloggers to DDoS attacks.
Security
Report: Apple and Facebook Accidentally Hand Over User Data to Hackers
The cybercriminals submit fake emergency requests. Allegedly, this is how they get hold of users' addresses and phone numbers. It is possible that the 16-year-old, allegedly behind the recent attacks by the group LAPSUS$, is also invol ...
Digital April Fool’s Jokes or No Jokes After All?
Self-driving suitcases, smart bike locks, pint-ale cameras: a lot is technically possible - with more or less serious side effects.
What Distinguishes Good Tools for IT Forensics?
Digital forensics tools and processes help with fast and targeted responses after cyberattacks.
Sichere Online-Authentifizierung
Swissbit stellt seinen ersten Authenticator für den offenen Authentifizierungsstandard FIDO2 vor.