Hackers use SSH to control connected devices for brute-force attacks
A report reveals that hackers can easily move past the SSH login block with a few simple tricks if the manufacturer-provided credentials remain unchanged. Thanks to this, internet-based devices are used in brute-force attacks on consumers.
Yahoo secretly scanned customer emails for U.S. intelligence: sources
Yahoo Inc last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.
Yahoo Mail flaw gets fixed, and a researcher nets $10K
If the bug hadn't been squashed, users of Yahoo's email service might have been victimized merely by reading a compromised message.
Scottrade Says Hack Could Have Affected 4.6M Customers
Online discount broker Scottrade said Friday believes it was the victim of a data breach from late 2013 to early 2014 that targeted client names and addresses.
Tens of Thousands of Routers, IP Cams Infected by Vigilante Malware
A mysterious piece of malware has infected tens of thousands of devices across the world, but its operator hasn’t used them for any malicious purposes.