Posted on

Thefts, Fraud and Lawsuits at the World’s Biggest NFT Marketplace

Chris Chapman used to own one of the most valuable commodities in the crypto world: a unique digital image of a spiky-haired ape dressed in a spacesuit.Mr. Chapman bought the […]




Posted on

How to Spot Scams That Mimic the IRS or Charities

Fraud is a year-round activity, but tax season brings an uptick in calculated schemes to steal money and personal information through spoofed messages and other means. Cybersecurity firms have also […]




Posted on

Volunteer Hackers Converge on Ukraine Conflict With No One in Charge

Ukraine has been more deliberate about recruiting a volunteer hacking force. In Telegram channels, participants cheer their collaboration with the government in going after targets such as Sberbank, the Russian […]




Posted on

Toyota Stops Production After Possible Cyberattack at a Supplier

TOKYO — Toyota, the world’s largest automaker, said on Monday that it had suspended all production in Japan after a possible cyberattack at a major supplier.The stoppage followed a problem […]




Posted on

Russia Could Use Cryptocurrency to Mitigate U.S. Sanctions

When the United States barred Americans from doing business with Russian banks, oil and gas developers and other companies in 2014, after the country’s invasion of Crimea, the hit to […]




Posted on

Cybersecurity Firm Pull Off a Rare Ransomware Win

While Emsisoft would not identify the victims, it said they had included key manufacturers, transportation companies and food suppliers across continental Europe, Britain and the United States.The timeline of Emsisoft’s […]




Posted on

A Rare Win in the Cat-and-Mouse Game of Ransomware

While Emsisoft would not identify the victims, it said they had included key manufacturers, transportation companies and food suppliers across continental Europe, Britain and the United States.The timeline of Emsisoft’s […]




Posted on

Apple Security Update Closes Spyware Flaw in iPhones, Macs and iWatches

The consortium did not disclose how it had obtained the list, and it was unclear whether the list was aspirational or whether the people had actually been targeted with NSO […]




Posted on

As Cyberattacks Surge, Security Start-Ups Reap the Rewards

On a Friday evening in October, Mr. Chandna, the Greylock venture capitalist, introduced the chief executive of an email security company he had invested in, Abnormal Security, to another investor, […]




Posted on

How China Transformed Into a Prime Cyber Threat to the U.S.

Nearly a decade ago, the United States began naming and shaming China for an onslaught of online espionage, the bulk of it conducted using low-level phishing emails against American companies […]