
In Pictures: 20 infamous hacker security vendor break-ins
Here are 20 of the most notorious known break-ins over the past decade.
It could be a scene from almost any city start-up office on a Friday afternoon, except the workers here have been flown in from five continents, and will eat tonight at Sydney’s most expensive restaurants before wandering back to their beds at the five star Westin hotel over the road.
Yahoo’s massive data breach in which at least 500 million user accounts have been hacked may be “the straw that breaks the camel’s back” and complicate its planned sale to Verizon, says Centrify.
A U.K. judge has ruled in favor of extraditing a British man to the U.S. for hacking government computers, despite fears he may commit suicide.
Adobe Systems' Flash plugin gets no love from anyone in the security field these days. A new study released Monday shows just how much Flash is favored by cybercriminals to sneak their malware onto computers.
LightCyber, another security startup with the roots in the Israeli military, has opened its doors in the U.S. and is announcing new products and features to make its mark in the crowded field of endpoint detection and remediation.
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.