- Users smallest source of concern despite causing most security breaches: CompTIA
- Security Watch: SecurEnvoy partners with Connector Systems in new distro deal
- Verizon subscribers can now opt out of 'supercookies'
- Police investigations threatened as metadata retention feeds telephony diaspora
- New malware program used in attacks against energy sector companies
cybercrime - News, Features, and Slideshows
Two former U.S. government agents face charges related to stealing hundreds of thousands of dollars worth of bitcoin while assisting with an investigation of the Silk Road underground online marketplace, with one accused of using a fake online persona to extort money from operators of the site.
Two Vietnamese men have been indicted, with one pleading guilty, for hacking into eight U.S. email service providers and stealing 1 billion email addresses and other confidential information, resulting in what's believed to be the largest data breach in U.S. history, the U.S. Department of Justice announced.
British law enforcement agencies arrested a 23-year-old man suspected of being involved in a hacking attack last year against a satellite communications system operated by the U.S. Department of Defense.
European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims.
Two U.S. government agencies are offering a US$3 million reward for information leading to the arrest or conviction of a Russian man suspected of having served as an administrator for the destructive Gameover Zeus botnet.
There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.
It may be difficult to remember now, but not too long ago, cyberattacks rarely made headlines in mainstream news. That's not to say that these advanced persistent threats, sometimes state-sponsored or the product of organized crime, were uncommon. On the contrary, they were booming. It was just that few people liked to talk about them.
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
In the aftermath of RSA saying that its SecureID two-factor authentication tokens may have been compromised in a data breach of the company's network, here are some key questions and answers about the situation.
The European Commission is seeking to strengthen cooperation between law enforcement and private industry worldwide as well as increase penalties for those engaged in cybercrime, a senior official said on Wednesday.
Whitepapers about cybercrime
Threat intelligence transforms the technical analysis required to identify the symptoms of a cyber attack - such as malware and security events - into an understanding of who the attackers are and what their motives and capabilities may be.
- 5 for 15: Todd Parsons, Avaya Australia and New Zealand channel director
- Aussie appetite for fast broadband proves to be insatiable
- Dicker Data partners NEXTDC to provide "affordable" Cloud solutions
- There should be a ‘when, not if’ approach to security issues in the channel: LogRhythm
- Huawei's Australian enterprise business posts triple digit revenue growth
- Target: Emotional social vital to customer experience management
- CMO Interview: What it takes to be a smart marketing chief
- How NPS has helped NIB keep customers
- Report reveals obstacle to better customer service is organisational, not technical
- Stackla and Hootsuite partner to launch new social media integration