How Trump’s Tariffs Could Drive Up Tech Prices

Image: Gage Skidmore/Flickr/Creative Commons President Donald Trump has imposed tariffs that could reshape the North American tech landscape, adding $50 billion in new costs for imports from Canada and Mexico alone. The tariffs — 25% on all imports from Canada and Mexico, 10% on Chinese goods, and 25% on European Union tech components like semiconductors…

Read More

New scam involves fake BianLian ransomware notes

There’s a scam going around that involves impersonating ransomware group BianLian, warns the Federal Bureau of Investigation. On Thursday, the FBI issued a warning that describes the scam. Ransoms letters (yep, snail mail) are sent to corporate executives claiming to be from “BianLian Group,” a known Russian ransomware gang, saying they’ve infiltrated the organization’s network…

Read More

FBI says scammers are targeting US executives with fake BianLian ransom notes

The FBI is warning that scammers are impersonating the BianLian ransomware gang using fake ransom notes sent to U.S. corporate executives. The fake ransom notes, first reported by U.S. cybersecurity company GuidePoint Security, claim that hackers have gained access to an organization’s network to steal sensitive data, and threaten to publish the stolen data unless…

Read More

DoJ Busts Alleged Global Hacking-for-Hire Network

Image: BirgitKorber, Getty Images/iStockphoto The Justice Department has charged 12 Chinese nationals for their alleged involvement in global hacker-for-hire activities. According to court documents, targets included the U.S. Treasury Department, journalists, and religious organisations. The attacks aimed to steal data and suppress free speech. The indictment names two officers of China’s Ministry of Public Security,…

Read More

Critical Zero-Day Vulnerabilities Found in These VMware Products

Broadcom has patched three actively exploited zero-day vulnerabilities in VMware ESXi, Workstation, and Fusion, discovered by Microsoft’s Threat Intelligence Center. The flaws, which were being leveraged in real-world attacks at the time of discovery, could allow attackers with administrator or root access to a virtual machine to breach the underlying hypervisor, potentially exposing all connected…

Read More