How hackers are using Bluetooth to track police activity

How hackers are using Bluetooth to track police activity

Cops use all sorts of tech to track individuals — facial recognition comes to mind, as does mimicking cell phone towers to get pings or mobile data tracking. But some people are finding ways to use technology to listen back. Bluetooth signals might reveal where police are and when they are and when devices like …

Read more

Cybercriminals Assume Identity of a Cybersecurity Company in Order to Hijack and Encrypt Your PC

Cybercriminals Assume Identity of a Cybersecurity Company in Order to Hijack and Encrypt Your PC

New methods of attack by hackers continue to emerge, making it increasingly difficult to trust even reputable sources. A recent example is a ransomware attack known as SophosEncrypt, which impersonates the cybersecurity vendor Sophos. This attack can seize control of your files or even your entire PC, demanding payment for decryption. Initially believed to be …

Read more

Russian Spy Malware Successfully Disarmed by FBI

Russian Spy Malware Successfully Disarmed by FBI

The FBI has disrupted a long-running malware operation that allowed Russian spies to steal sensitive information from various countries. Among the targets are NASA-member governments, prominent journalists and those deemed to be of interest to the Russian government. The court-authorized operation named MEDUSA has disrupted a global peer-to-peer network of computers compromised by a sophisticated …

Read more