A cyber criminal ring targeting small retailers in 11 countries stole data on 49,000 payment cards using a malicious software known as "ChewBacca" before the operation was shut down, according to a cyber research firm.
The popularity of Bitcoin and other digital/cryptographic currency cannot be denied. Different users like using it for different reasons, but many agree that the question of keeping their stash safe is something that occasionally keeps them up at night.
Usernames and passwords of some of Yahoo's email customers have been stolen and used to gather personal information about people those Yahoo mail users have recently corresponded with, the company says.
How pervasive is the mobile malware threat? New research shows that malicious code is infecting more than 11.6 million mobile devices at any given time, putting their owners at increased risk for stolen personal and financial information; bill shock resulting from pirated data usage; and extortion in exchange for device control.
Ari Juels, an independent researcher who was previously chief scientist at computer security company RSA, thinks something important is missing from the cryptography protecting our sensitive data: trickery.
I had a rare Twitter username, @N. Yep, just one letter. I’ve been offered as much as $50,000 for it. People have tried to steal it. Password reset instructions are a regular sight in my email inbox. As of today, I no longer control @N. I was extorted into giving it up.
Angry Birds creator Rovio Entertainment Ltd. says the popular game's website was defaced by hackers Wednesday, two days after reports that the personal data of its customers might have been accessed by U.S. and British spy agencies.
Researchers have uncovered a piece of botnet malware that is capable of infecting computers running Windows, Mac OS X, and Linux that have Oracle's Java software framework installed. The cross-platform HEUR:Backdoor.Java.Agent.a, takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June.
It's one of the more crude and old-school cyber attacks, but the distributed denial-of-service (DDoS) attack just keeps getting stronger, faster, and harder to deflect: new data shows the largest attack last year registered three times the volume of DDoS attacks in previous years, and attacks against SSL-protected websites jumped nearly 20 percent.
Aleksandr Andreevich Panin, aka "Gribodemon" and "Harderman," has pled guilty to charges accusing him of being the primary developer and distributor of the SpyEye banking trojan, according to the FBI. SpyEye, a derivative of Zeus was, before his arrest in July 2013, the world's foremost banking malware, having infected a reputed 1.4 million computers.
To meet the growing need for highly skilled cybersecurity, forensics and global security and intelligence experts, Embry-Riddle Aeronautical University’s Prescott, Ariz., campus is launching the nation’s first College of Security and Intelligence (CSI).
In President Obama’s speech recently outlining surveillance reforms, the president promised he would allow corporations like Google, Apple and Microsoft to be more transparent with their customers about NSA spying. Now, we have learned what that means.
Security experts have long warned that users should be more concerned about the sometimes excessive personal data that some apps take from their hosts. Now it seems that criminals and advertisers are not the only people interested in this information: NSA and GCHQ have been developing the ability to take advantage of leaky mobile apps.
The vice chairman of the Bitcoin Foundation, a trade group promoting the adoption of the digital currency, has been charged by U.S. prosecutors with conspiring to commit money laundering by helping to funnel cash to illicit online drugs bazaar Silk Road.
While investigating a hosting company known for sheltering child porn last year the FBI incidentally seized the entire email database of a popular anonymous webmail service called TorMail. Now the FBI is tapping that vast trove of email in unrelated investigations.