Please turn on your JavaScript for this page to function normally.
Card readers in Barnes & Noble stores hacked by crooks

On September 14, Barnes & Noble, the largest book retailer in the United States, has turned off the keypads in front of registers in all of their physical stores without …

Universal Man in the Browser attack targets all websites

Trusteer have discovered a new Man in the Browser (MitB) scam that does not target specific websites, but instead collects data submitted to all websites without the need for …

Hackers leak 120,000+ records raided from top universities

Team GhostShell, a hacker group affiliated with Anonymous, has leaked online information from over 120,000 user accounts stolen from the databases of over 100 higher education …

Visual Android Trojan as virtual theft aid

The rise of mobile malware in the last few years has been well documented, and the latest reports show that malware sending out text messages to premium rate numbers is the …

Rental computers spied on and photographed users, FTC claims

Seven rent-to-own companies and a software design firm have agreed to settle Federal Trade Commission charges that they spied on consumers using computers that consumers …

IEEE data breach demonstrates need for increased server-level security

According to news reports, the usernames and passwords of 100,000 members of the Institute of Electrical and Electronics Engineers (IEEE) have been found unencrypted on a FTP …

Bogus Second Life survey leads to card info theft

Users of popular online virtual world Second Life are in danger of getting their credit card details stolen via phishing pages that supposedly offer 2500 Linden dollars …

Stolen card data on sale on professional-looking e-shop

The theft of debit and credit card information has become a lucrative business, but sometimes the individuals that engage in the stealing are not so eager to user the …

Ex-CME programmer admits to stealing source code

A former senior software engineer for Chicago-based CME Group pleaded guilty to theft of trade secrets for stealing computer source code and other proprietary information …

Majority of companies suffered a web application security breach

Web application security incidents have become increasingly common and expensive, with the majority of companies experiencing at least one breach in the last 18 months and …

LinkedIn-themed spam using data stolen in June breach?

Spoofed LinkedIn emails notifying recipients of messages requiring their attention are not a new occurrence, but the recently rent out ones seem to be more targeted than …

Structured method to data breach analysis and response

Data breaches are growing in frequency and magnitude, and have a tremendous financial, legal, operational and reputational impact to the breached organization, whether …

Don't miss

Cybersecurity news