Welcome to HackSurfer! Share your cyber news with the world.
We're the web’s cybercrime news and info hub built on top of HackSurfer’s social, open source and partner data collection system.

Close
  • Daily Roundup
  • Recent Posts
More
  • Featured
  • Community
IT

Most Notable Info
Windows seems to have missed part of the vulnerability that allowed Sandworm to target victims. The company has issued a statement that they are currently making a new patch to address the issue. This particular vulnerability is in the Power Point program, “thes...

Read More

A website design flaw in NeedMyTranscript.com, a website that helps users obtain past transcripts from more than 18,000 high schools in all 50 states, has led to the possible exposure of almost 100,000 user personal data. The flaw leads website visitors to a si...

Read More
Government

Security researchers at Trend Micro released a report today about a cyber-espionage group dubbed Operation Pawn Storm. 
“Pawn Storm is an active economic and political cyber-espionage operation targeting a wide range of entities, mostly those related to the militar...

Read More
Government

We all know Congress is horribly behind regarding cybersecurity policy and oversight. However, a group of Senators want to review the 'Internet of things.' A bipartisan group from the Commerce, Science and Transportation Committee, sent a letter asking the Chairman and r...

Read More
Thellmic
by Mike
Financials

Most Notable Info

The FBI recently warned companies about the uptick in the theft of financial data. They claim over 500 million financial records were stolen in the last 12 months, over 400 million of those in the last six months. These revelations came during a fin...

Read More
IT

Google announced through their online security blog yesterday that they are adding “stronger protection for particularly security-sensitive individuals.” 
The added security comes in “a physical USB second factor that only works after verifying the login site is truly a...

Read More
IT

How often are you on your cellphone? Do you carry it everywhere with you? How much information does it contain about you or your company?
And what would you do if all that information was stolen?Blackphone, which describes itself as the “first smartphone to put privacy and contro...

Read More

For anyone who goes online, it’s impossible to hack-proof yourself, but not impossible to make a hacker’s job extremely difficult. Here are three things to almost hack-proof yourself.Two-factor authentication. Imagine a hacker, who has your password, trying to get into your accoun...

Read More

Week seven has come and gone, leaving only six weeks left to go in the regular season of 2014's HackSurfer Fantasy Cybercrime League.
For those unfamiliar, a few months back the HackSurfer staff drafted rosters of our favorite cybercrime tags: an industry sector, a cyber...

Read More
Telecom

Most Notable Info

In a recent study conducted by Kaspersky Labs, mobile phone malware is primarily designed to steal banking credentials or money. The focus of the study was Android specific phones which, 
according to the Phys.org, accounts for 98% of phones...

Read More
Consumer Goods

The year of 2014 has certainly seen a lot in the world of cybercrime, especially in the consumer goods sector. With news this morning about a possible breach of several Staples stores located in the northeastern United States, this might be a trend that sticks around for the ...

Read More
Financials

Bitcoins has been out of the spotlight for the past month due to its declining value but hackers are still active in trying to find creative ways to steal the virtual currency.  Hackers are now accessing internet providers and "Stealing an entire chunk of raw internet tr...

Read More