Please turn on your JavaScript for this page to function normally.
Researchers link string of breaches to Chinese man

Security researchers rarely managed to trace hacking attacks back to a person or a specific entity, but it seems that Trend Micro experts have succeeded in tying a former …

1.5 million cards compromised in Global Payments breach

A massive breach of the processing system of Atlanta-based Global Payments has been confirmed by the company. “The company believes that the affected portion of its …

Complex security architectures and innovation

Martin Borrett is the Director of the IBM Institute of Advanced Security in Europe. He leads the Institute and advises at the most senior level in clients on policy, business, …

Cybercriminals increasingly target financial services industry

A report published this week by PricewaterhouseCoopers (PwC) has revealed that the financial services sector is the most common target of cybercriminals, with cybercrime …

Ghost in the Wires

Kevin Mitnick accessed computers and networks at the world’s biggest companies – and however fast the authorities were, Mitnick was faster, sprinting through phone …

Mousetrap Trojan steals money by chain reaction

Catalin Cosoi, Chief Security Researcher at Bitdefender warns of a new Trojan that robs your bank account. The new Mousetrap campaign starts with a Java applet that has been …

Is Ukraine the perfect place for hackers?

What is it that makes the Ukraine such a fitting refuge for hackers and cyber crooks? According to a number of well-informed individuals, it is a combination of inadequate …

“Google Pharmacy” spam hitting inboxes

Google’s name and reputation is once again being misused by spammers trying to trick users into believing that what they are selling is endorsed or approved by the …

25 alleged Anons arrested

25 individuals suspected to be Anonymous members have been arrested during a coordinated international operation supported by Interpol across four countries in Europe and …

Thwarting attacks with genetically-inspired computer configuration systems

In the seemingly unending search for computer security solutions that are both reactive and proactive, researchers have occasionally turned to other sciences for ideas. In …

Horde FTP server hacked, files modified to include backdoor

The developers of the Horde open source software have issued a statement warning its users that a one of their FTP servers was discovered to have been breached and some files …

MasterCard and Silver Tail Systems combat online fraud

MasterCard and Silver Tail System announced a relationship that will enable merchants to differentiate fraudsters from legitimate consumers in real-time during the online …

Don't miss

Cybersecurity news