There's a disturbing new angle to cyberattacks that has become more common over the last year, and it is proving costly for organizations: extortion.
Stories by Jeremy Kirk
The Internet is becoming harder to browse for users of Tor, the anonymity network that provides greater privacy, according to a new study.
Two web browsers developed by Chinese search giant Baidu have been insecurely transmitting sensitive data across the Internet, putting users' privacy at risk, according to a new study.
A long-known group of cyberattackers have set Japanese organizations and companies in their sights in a resurgence of hacking activity, according to security vendor Cylance
CloudFlare has launched a domain name registration service with enhanced security controls designed to prevent domain hijacking, a serious attack that can have far-reaching consequences for companies.
The source code for a powerful Android malware program that steals online banking credentials has been leaked, according to researchers with IBM.
A new kind of Android malware can steal online banking credentials and hold a device's files hostage for ransom, delivering a particularly nasty one-two punch.
A security company recently laid tempting bait online in order to see how hackers would react. The findings aren't surprising but show how quickly leaked data is used by shady characters.
A Los Angeles hospital has paid a $17,000 to cyberattackers who crippled its network by encrypting its files, a payment that will likely rekindle a fierce debate over how to deal with a problem known as ransomware.
A new flavor of ransomware, similar in its mode of attack to the notorious banking software Dridex, is causing havoc with some users.
Craigslist, the popular online listings service, has waged a long fight against scammers, but a new academic study suggests it's losing the battle.
A malware program for Android seen advertised on Russian underground forums in the last few months appears to have made its first big debut.
Attackers are still trying to find Magento installations that haven't patched a particularly bad vulnerability, this time trying to trick people into downloading a fake patch.
The attackers who crippled Ukrainian power operators in December probably committed attacks shortly before against a mining company and a railway operator, Trend Micro said Thursday.
Four third-party app stores for Android have apps with a malicious component that seeks root access to the device, according to Trend Micro.
- Senior Project Manager - Permanent Opportunity NSW
- Senior Agile Business Analyst NSW
- Salesforce Technical Business Analyst QLD
- Business Solutions Specialist NSW
- Technical Consultant MS Dynamics AX SA
- Test Specialist - Network VIC
- Microsoft Dynamics AX Functional Consultant Advanced Warehouse Management WA
- Microsoft Dynamics AX Functional Consultant Advanced Warehouse Management SA
- Senior Business Analyst NSW
- Junior Design Project Coordinator QLD
- 6 cities | 20 exhibitors | International & local keynotes | Hear from Mark Loveless 'Simple Nomad' & Jeff Lanza Former FBI - Save your seat at CSO Perspectives Roadshow
- Answer 5 quick questions and you could win a Lego Mindstorm EV3, (valued at $499).
- Participate in this market research and go into the draw to win a Lego Death Star, (valued at $999).
- WIN a HTC Vive Kit valued at $1399, take this 3 minute survey for your chance to WIN!