From the researchers that brought you BEAST and CRIME comes another attack against Secure Sockets Layer (SSL), one of the protocols that's used to secure Internet traffic from eavesdroppers both government and criminal.
It's not just big businesses like JPMorgan Chase, Target and Home Depot that get hacked. Small companies suffer from intrusions into their computer systems, too.
Snapsaved.com, a website which allows users to save images sent via Snapchat, claims that hackers had breached its servers and made off with some 500 megabytes of photographs.
A group of cyber spies targeted the North Atlantic Treaty Organization (NATO), Ukrainian and Polish government agencies, and a variety of sensitive European industries over the last year, in some cases using a previously unknown flaw in Windows systems to infiltrate targets, according to a research report.
The Mayhem botnet is here to wreak, well, mayhem — and it’s using the Shellshock vulnerability to do it with fresh purpose.
Dropbox has denied that they have been hacked, and that the login credentials leaked by a unknown individual on Pastebin are those of Dropbox users.
A class of coding vulnerabilities could allow attackers to fool Windows system administrators into running malicious code because of a simple omission: quotation marks.
Mobile messaging company Snapchat blamed third-party software apps for possible security lapses that may have led to its users' private photos being at risk of online publication by hackers.
First via a filing with the US Securities and Exchange Commission, and then via a press release, Sears Holding Corporation has confirmed a month-old breach that affected POS systems at its Kmart stores.
There are only "around 100" cybercriminal kingpins behind global cyber crime, according to the head of Europol's Cybercrime Centre. Law enforcers needed to target the "rather limited group of good programmers."
Locked Shields is among the world’s preeminent cyberattack simulations. For two days, international teams of hackers and system admins play both sides of a war game, simultaneously attacking and defending critical infrastructure. The details are realistic, and the exercises reflect real-world geopolitics.
Nearly every case Homeland Security Investigations (HSI) opens has some sort of digital evidence to be collected and analyzed. But the work can’t be done by just anyone. The data must be meticulously cared for by agents trained to preserve the integrity of the material, who can also combat suspects’ attempts to erase their digital dealings — even from afar.
China accused the United States on Thursday of faking facts, after the head of the FBI said that Chinese hacking likely cost the U.S. economy billions of dollars every year.
Calling him "a leader in the marketplace for stolen credit card numbers," federal prosecutors added 11 new charges against a Russian man they say hacked into U.S. businesses to steal information that he allegedly sold on Internet "carding" sites.
NTP reflection attacks may be on the wane when it comes to distributed denial of service (DDoS) campaigns, but they’ve been replaced by a surge in Simple Service Discovery Protocol (SSDP) attack, according to new data from Arbor Networks.