Diseases infect people—but cyberattacks infect x-rays and MRIs machinesByCaleb Li and Gregory FalcoPublishedJuly 7, 2017
Video: Ukrainian police raid a company that inadvertently spread malware with software updatesByKeith CollinsPublishedJuly 6, 2017
The hackers who knocked out critical services in Ukraine are now demanding an absurd ransomByKeith CollinsPublishedJuly 5, 2017
The Petya ransomware attack made $20k less than WannaCry in its first 24 hoursByKeith CollinsPublishedJune 28, 2017
The cyber attack that knocked out Ukraine this morning is now going globalByMax de Haldevang and Keith CollinsPublishedJune 27, 2017
Wikileaks: The CIA can remotely hack into computers that aren’t even connected to the internetByKeith CollinsPublishedJune 24, 2017
If your home wifi router is on this list, it might be vulnerable to CIA hacking toolsByKeith CollinsPublishedJune 16, 2017
This malware activates when you hover over a link in Microsoft PowerPointByKeith CollinsPublishedJune 12, 2017
The alleged theft and sale of Apple customers’ private data has led to 22 arrests in ChinaByDave GershgornPublishedJune 8, 2017
Pacemakers have thousands of vulnerabilities hackers can exploit, study findsByKeith CollinsPublishedJune 3, 2017
Is it ethical for these researchers to pay hackers for access to malware before it’s unleashed?ByKeith CollinsPublishedMay 31, 2017
This WannaCry-like trojan horse uses your computer’s resources to mine for moneyByKeith CollinsPublishedMay 30, 2017
Inside the digital heist that terrorized the world—and only made $100kByKeith CollinsPublishedMay 21, 2017
The people who fight hacking and cybercrime are turning to designers for helpByAnne QuitoPublishedMay 19, 2017
Victims of the WannaCry ransomware attacks have stopped paying upByKeith CollinsPublishedMay 17, 2017
The global ransomware attack is highly effective advertising for cybersecurity stocksByJoon Ian WongPublishedMay 15, 2017
What you need to know about Trump’s executive order on cybersecurityByKeith CollinsPublishedMay 12, 2017
Don’t click the Google Docs link in that suspicious email you probably just gotByKeith CollinsPublishedMay 3, 2017
If you only work on your malware on weekdays, you might be a CIA hackerByKeith CollinsPublishedApril 11, 2017