- Large scale attack hijacks routers through users' browsers
- Minecraft used as cover to push Android scareware apps on Google Play
- Android's reset function fails to delete data from Samsung and HTC smartphones
- Hacked Adult Friend Finder database offered for $17,000
- Significant virtual machine vulnerability has been hiding in floppy disk code for 11 years
Cybercrime and Hacking - News, Features, and Slideshows
About 4.5 million people in 28 states face the risk of identity theft due to a massive data breach at Community Health Systems (CHS) a Franklin, Tenn., based health network.
A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company's stores in June and July.
Ferguson, Mo., the city now in the midst of protests over a fatal police shooting, runs the type of IT department that gets almost no attention.
A lawsuit filed in Tennessee earlier this month has resurfaced questions about a bank's responsibility in protecting customers against cyberheists.
In a new trend, Windows tech support scams have gone home-grown, with twists that include bogus warnings from malicious websites urging users to call a toll-free number for "help."
News that Russian hackers amassed log-in credentials belonging to more than 1.2 billion Internet users hammers home why companies that have not implemented strong authentication measures really need to get moving on it.
A report to be released at Black Hat this week will reveal which vehicles are more susceptible to hackers.
Malicious hackers are using remote access tools to break into retail point-of-sale systems and plant malware on them, the Department of Homeland Security warned.
A status update filed in Pennsylvania by the U.S. Department of Justice said that both the Gameover Zeus botnet and Cryptolocker 'remained neutralized.'
Microsoft has restored service to its security advisory mailing list, but it has buried the sign-up form and made it hard to find.
The Department of Homeland Security mistakenly released details on an experiment in which a 27-ton generator was destroyed via a cyberattack.
Notorious Russian leaker Wzor denied any link between the publication of internal Microsoft info and a former employee who stole trade secrets.
A sophisticated Chinese hacker group that had been stealing information from U.S. policy experts on Southeast Asia suddenly changed targets last month to focus on Iraq, security researchers said Monday.
Hackers recently broke into payment systems at several northwestern U.S. restaurants and food service firms via a remote access account belonging to one of their vendors, another example of the need for companies to monitor third-party access to their networks.
Microsoft's tactics in using a court order to seize nearly two-dozen No-IP.com domains it said were used to distribute Windows malware tools were called ham-handed by several critics.
- Exclusive Networks APAC posts bumper growth in first quarter
- Ingram Micro launches professional and training services for Aussie resellers
- Symantec's Holtzhausen to head Veritas channel business across APJ
- Barracuda and Aerohive partner for BYOD security
- Cloud back-up is vital for reseller and MSP profitability: CloudBerry Lab
- Why optimisation is the name of the game at First
- Video, mobile show strong growth in IAB's Q1 online advertising report
- Twitter offers marketers objective-based advertising programs
- Coming to Firefox: Ads based on your browsing history
- Woolworths customer leader, Jess Gill, departs, following CMO out the door