Welcome to HackSurfer! Share your cyber news with the world.
We're the web’s cybercrime news and info hub built on top of HackSurfer’s social, open source and partner data collection system.

Close
  • Daily Roundup
  • Recent Posts
More
  • Featured
  • Community
Financials

ATMs have been a convenient way for customers to access quick cash out of their accounts, but with all the ATM-related cybercrime stories, just how safe are they? ATM scams have been around for a long time. The latest evolution in ATM scams involve hackers using mal...

Read More
IT

Most Notable Info A recent study "puts the average developer at a D rating when it comes to a security score for standard vulnerabilities" in application security. The year-long Aspect Security study included 1,425 developers from 695 companies worldwide...

Read More
IT

Goodwill was the victim of a cyber-attack that lasted for 18 months before it was detected. CK Systems, a hosting provider that processed payment cards for Goodwill Industries, had intruders accessing their network from Feb. 10, 2013 until August 14, 2014.  The length of...

Read More
IT

A vulnerability in Twitter that allowed unauthorized users to delete credit cards from any account could have been exploited to cut the payments the company gets for advertisements. Reportedly, all that was needed to delete a credit card is a six...

Read More
8o5bvjwi bigger
by Eric
Government


Most Notable Info 
The Chinese government successfully penetrated the computer systems of U.S. Transportation Command contractors at least 20 times in 12-month period beginning June 1, 2012, according to a report released Wednesday by the Senate Armed Services Co...

Read More
Energy

Threat protection firm Bromium was alerted last week of a watering hole attack originating from a U.S. based company's website. Malicious code was planted on the website of a high-profile technology startup in the oil and gas industry. Visitors of the website were redirected ...

Read More
IT

Supply chain cybercrime is a serious problem. As Jason Polancich, SurfWatch Labs chief architect, pointed out in a recent Security Week Column, these outside companies often have a lot of access."Often, not only are these companies handling your most sensitive data, but ...

Read More
IT

You can buy encryption tools to prevent people from reading the contents of your e-mails should they intercept them. But what about those who have NSA-caliber resources and skills?The problem is that encryption services usually leave wide open the e-mail’s metadata: e.g., sender, ...

Read More
Financials

Insider Activity can happen right in front of you.  It is one of the most difficult cybercrimes to stop, as the people responsible are already inside the network.In recent news, that was exactly the case. In New York, five individual were arrested for their involvement i...

Read More
Financials

Most Notable Info Nigerian police are searching for an IT worker who is alleged to have stolen $40 million from Skye Bank. A team of people allegedly received access to the bank's premises while disguised as maintenance workers, and then proceeded to a...

Read More
IT

Facebook is over one billion members strong. This is wonderful news for the company. However, where people go, cybercriminals follow. Facebook is one of the most common methods used to spread phishing messages, trick people into clickjacking, spam users, and – the number one pract...

Read More
IT

Today, Apple began offering two-step verification for iCloud accounts. The changes come after the theft and release of nude photos from celebrities' accounts last month, which thrust Apple into the spotlight. 

This recent incident is by far the most dominan...

Read More

Keep up with Possible Threats to Your Business. And Much More.

Top Active Users
Most Viewed | Past 5 Days
New Sharers