There's a disturbing new angle to cyberattacks that has become more common over the last year, and it is proving costly for organizations: extortion.
Stories by Jeremy Kirk
The Internet is becoming harder to browse for users of Tor, the anonymity network that provides greater privacy, according to a new study.
Two web browsers developed by Chinese search giant Baidu have been insecurely transmitting sensitive data across the Internet, putting users' privacy at risk, according to a new study.
A long-known group of cyberattackers have set Japanese organizations and companies in their sights in a resurgence of hacking activity, according to security vendor Cylance
CloudFlare has launched a domain name registration service with enhanced security controls designed to prevent domain hijacking, a serious attack that can have far-reaching consequences for companies.
The source code for a powerful Android malware program that steals online banking credentials has been leaked, according to researchers with IBM.
A new kind of Android malware can steal online banking credentials and hold a device's files hostage for ransom, delivering a particularly nasty one-two punch.
A security company recently laid tempting bait online in order to see how hackers would react. The findings aren't surprising but show how quickly leaked data is used by shady characters.
A Los Angeles hospital has paid a $17,000 to cyberattackers who crippled its network by encrypting its files, a payment that will likely rekindle a fierce debate over how to deal with a problem known as ransomware.
A new flavor of ransomware, similar in its mode of attack to the notorious banking software Dridex, is causing havoc with some users.
Craigslist, the popular online listings service, has waged a long fight against scammers, but a new academic study suggests it's losing the battle.
A malware program for Android seen advertised on Russian underground forums in the last few months appears to have made its first big debut.
Attackers are still trying to find Magento installations that haven't patched a particularly bad vulnerability, this time trying to trick people into downloading a fake patch.
The attackers who crippled Ukrainian power operators in December probably committed attacks shortly before against a mining company and a railway operator, Trend Micro said Thursday.
Four third-party app stores for Android have apps with a malicious component that seeks root access to the device, according to Trend Micro.
- Senior Business Analyst VIC
- ICT Business Analyst ACT
- Solutions Architect (Data Warehouse/Application Integration) - Contract - Sydney NSW
- Test Engineer NSW
- Senior Architect | Perl | Linux |MySQL | Infrastructure | Telecom NSW
- Network Designer VIC
- BPM Consultant NSW
- Microsoft Dynamics AX Manufacturing Consultant SA
- Contract Computer Operator (UNIX/Windows-based) 161014/CO/vmt Asia
- Excel Specialist NSW