Here’s a question: if you connect an unprotected Windows computer to the internet, how long will it take before it is infected by malicious software? The answer is:
Conventional security software is powerless against sophisticated attacks like Flame, but alternative approaches are only just getting started.
Those who commissioned the malware Flame also created the deadly Stuxnet, say Kaspersky Labs, who have discovered an identical piece of code in both worms.
"You might ask how we know this activity is state-sponsored. We can’t go into the details without giving away information that would be helpful to these bad actors, but ..."
Users of the Aryan-Front.com “white community” Web forum were greeted with an eye-opening memo from hacktivists when they tried to log-on to the message board Friday morning: you should have expected us.
The nasty Trojan known as Citadel malware, which is based on Zeus, has typically been used to extort money from online banking users.
Nations Back Off Unofficial Claims of Credit
A powerful data-snatching virus targeting computers in Iran, Israel and other Middle Eastern countries has been discovered by Russian experts.
Secretary of State Hillary Clinton essentially admitted to playing precisely the same dirty game al-Qaeda is playing
Hacking is a vital tool to fight extremist propaganda, US State Secretary Hillary Clinton has revealed.
Hackers operating under the title of “Anonymous” claim to have leaked internal emails and other electronic documents from the U.S. Bureau of Justice Statistics website.
Major protest scheduled in Montreal to mark 100th day of rallies, as hacker group Anonymous downs government websites.
Hackers could automate a social engineering trick that has already been proven to work.
George Hotz, an infamous hardware hacker better known online as Geohot, has a PlayStation that he’s not allowed to play with — at least not the way he likes to, which involves figuring out how to bypass manufacturers’ artificial limits on what users
It’s not news that surveillance cameras are practically everywhere in America, but do you know who exactly is monitoring your every move?
A hacker tied to Anonymous says the loose-knit collective may be the most powerful organization on Earth.
Rebekah Brooks, the former head of Rupert Murdoch’s British newspaper empire and a close friend of Prime Minister David Cameron, was formally charged on Tuesday, along with her husband and four others, of perverting the course of justice in the hacki
In a world where security cameras are nearly as ubiquitous as light fixtures, someone is always watching you.
The attackers chose their moment well.
Silicon Valley’s Mozilla Corporation has tasked themselves with extinguishing a fire, and no, it’s not what you have in mind.
After ignoring a serious security vulnerability in its product for at least a year, a Canadian company that makes equipment and software for critical industrial control systems announced quietly on Friday that it would eliminate a backdoor login acco
The hacking collective Anonymous is back with another pulse-pounding video
The House on Thursday approved cybersecurity legislation that privacy groups have decried as a threat to civil liberties.
Security professionals in both the U.S. government and in private industry have long feared the prospect of a cyberwar with China or Russia.
Just days before the US Congress starts discussing new cybersecurity legislation, those fighting for online freedoms unleashed their own ammunition by way of some new websites that strike to keep the Internet open.
We speak with Jacob Appelbaum, a computer researcher who has faced a stream of interrogations and electronic surveillance since he volunteered with the whistleblowing website, WikiLeaks.
A virus has been discovered in computers running key parts of Iran's oil sector, forcing authorities to unplug its main oil export terminal from the Internet.
Over the last two weeks the hacker group Anonymous has waged a vigorous campaign against Chinese government
In a stunning blow to Obama, Holder & Co., the 9th Circuit Court of Appeals ruled that violating an employer’s (read that: “Master’s”) computer policy cannot be prosecuted as hacking. In the never-ending quest of the power-addicted to extend the lEntered By: Gene Kernan
In the wake of increasing concern about the security of wireless medical devices, a privacy and security advisory board is calling on the government to grant the FDA or other federal entity the authority to assess the security of devices.