- French lawmakers take first step toward gathering all communications metadata
- Mobile ransomware targets Canadian porn viewers
- Cybercriminals borrow from APT playbook in attack against PoS vendors
- The Upload: Your tech news briefing for Tuesday, May 5
- Netflix open-sources security incident management tool
Cybercrime and Hacking - News, Features, and Slideshows
About 4.5 million people in 28 states face the risk of identity theft due to a massive data breach at Community Health Systems (CHS) a Franklin, Tenn., based health network.
A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company's stores in June and July.
Ferguson, Mo., the city now in the midst of protests over a fatal police shooting, runs the type of IT department that gets almost no attention.
A lawsuit filed in Tennessee earlier this month has resurfaced questions about a bank's responsibility in protecting customers against cyberheists.
In a new trend, Windows tech support scams have gone home-grown, with twists that include bogus warnings from malicious websites urging users to call a toll-free number for "help."
News that Russian hackers amassed log-in credentials belonging to more than 1.2 billion Internet users hammers home why companies that have not implemented strong authentication measures really need to get moving on it.
A report to be released at Black Hat this week will reveal which vehicles are more susceptible to hackers.
Malicious hackers are using remote access tools to break into retail point-of-sale systems and plant malware on them, the Department of Homeland Security warned.
A status update filed in Pennsylvania by the U.S. Department of Justice said that both the Gameover Zeus botnet and Cryptolocker 'remained neutralized.'
Microsoft has restored service to its security advisory mailing list, but it has buried the sign-up form and made it hard to find.
The Department of Homeland Security mistakenly released details on an experiment in which a 27-ton generator was destroyed via a cyberattack.
Notorious Russian leaker Wzor denied any link between the publication of internal Microsoft info and a former employee who stole trade secrets.
A sophisticated Chinese hacker group that had been stealing information from U.S. policy experts on Southeast Asia suddenly changed targets last month to focus on Iraq, security researchers said Monday.
Hackers recently broke into payment systems at several northwestern U.S. restaurants and food service firms via a remote access account belonging to one of their vendors, another example of the need for companies to monitor third-party access to their networks.
Microsoft's tactics in using a court order to seize nearly two-dozen No-IP.com domains it said were used to distribute Windows malware tools were called ham-handed by several critics.
- Cebit 2015: Aussie politicos claim ownership over knowledge economy
- AMEX Global Business Travel adopts new Cloud-based strategy
- INTERVIEW: AOL's Digital Prophet, Shingy, gives us his predictions for 2015
- Australia’s router market hits a downturn: IDC Australia
- Equinix to supply private managed connections to Microsoft Office 365
- CMO Council: Marketers lack right customer metrics for digital transformation
- Panel: Avoid social and you risk missing business growth opportunities
- 5 lessons from AMP on driving disruptive digital thinking
- Coles trials voice-recognition gizmo Hiku
- How Telstra is applying data analytics to customer experience