Please turn on your JavaScript for this page to function normally.
Visual Android Trojan as virtual theft aid

The rise of mobile malware in the last few years has been well documented, and the latest reports show that malware sending out text messages to premium rate numbers is the …

Rental computers spied on and photographed users, FTC claims

Seven rent-to-own companies and a software design firm have agreed to settle Federal Trade Commission charges that they spied on consumers using computers that consumers …

IEEE data breach demonstrates need for increased server-level security

According to news reports, the usernames and passwords of 100,000 members of the Institute of Electrical and Electronics Engineers (IEEE) have been found unencrypted on a FTP …

Bogus Second Life survey leads to card info theft

Users of popular online virtual world Second Life are in danger of getting their credit card details stolen via phishing pages that supposedly offer 2500 Linden dollars …

Stolen card data on sale on professional-looking e-shop

The theft of debit and credit card information has become a lucrative business, but sometimes the individuals that engage in the stealing are not so eager to user the …

Ex-CME programmer admits to stealing source code

A former senior software engineer for Chicago-based CME Group pleaded guilty to theft of trade secrets for stealing computer source code and other proprietary information …

Majority of companies suffered a web application security breach

Web application security incidents have become increasingly common and expensive, with the majority of companies experiencing at least one breach in the last 18 months and …

LinkedIn-themed spam using data stolen in June breach?

Spoofed LinkedIn emails notifying recipients of messages requiring their attention are not a new occurrence, but the recently rent out ones seem to be more targeted than …

Structured method to data breach analysis and response

Data breaches are growing in frequency and magnitude, and have a tremendous financial, legal, operational and reputational impact to the breached organization, whether …

Pirate Bay’s co-founder deported to Sweden, Anonymous hacks Cambodian ministry

Pirate Bay co-founder Gottfrid Svartholm has been deported from Cambodia and has landed at Stockholm’s airport this morning, reports TorrentFreak. The formal reason …

39% of IT staff can get unauthorized access to sensitive information

IT professionals are allowed to roam around corporate networks unchecked, according to a survey of more than 450 IT professionals by Lieberman Software. It found that 39% of …

Publishing firm says leaked Apple IDs came from their servers

BlueToad, a Florida-based digital edition publishing company, has announced that the recent massive Apple UDID leak originated from their own servers, and not an FBI laptop. …

Don't miss

Cybersecurity news