Computer Security News
News on Computer Security continually updated from thousands of sources around the net.
2 hrs ago | BBC News
The skills of amateur ''cyber defenders'' are being put to the test in London this weekend, as they try to protect the UK against a simulated cyber attack.
Trending on the Topix Network
6 hrs ago | Customer Interaction Solutions
The software developer has had the rare Twitter name @N since 2007. In a blog post, Naoki revealed that he had been offered $50,000 to sell the name, and also that there have been past attempts made to steal it.
10 hrs ago | Fortune
Everybody's Web software got " pwned " at the Pwn2Own hackers conference this week: Apple's Safari, Google's Chrome, Microsoft's Internet Explorer, Mozilla's Firefox and Adobe's Reader and Flash.
Security truths evolve-meaning, they change, and you must keep up with this, particularly with wireless security.
Criminals may already have made off with up to $500 million worth of bitcoins since the virtual currency launched in 2009 - and you can double that if it turns out they emptied Mt.
A senior GCHQ figure is concerned the organisation may not have the right people to deal with a sophisticated online assault.
Moscow, RUSSIAN FEDERATION: Russian President Vladimir Putin gestures as he speaks during a special interactive webcast, organised by the BBC and Russia's Yandex website at the Kremlin's workshop in Moscow, 06 July 2006.
Banks around the world, consumed with meeting more stringent capital regulations, will miss a deadline to upgrade outdated software for automated teller machines and face additional costs to Microsoft to keep them secure.
Target paid the price for its apparent failure; other big firms follow the same pattern and could face the same fate, analyst say Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools.
Hackers knocked out the Russian presidency's website several times on Friday and brought down the central bank website, the Kremlin press service said.
Unidentified hackers brought down the Russian presidency's site and the Central Bank's web page in a wave of online-attacks.
A BACKDOOR found in Samsung Galaxy smartphones and tablets allows hackers to remotely access and modify data, a security firm has claimed.
Web browser or Office suite? Microsoft's and Google's office productivity and collaboration clouds pit rich and complex against simple and lean more A recent IDG Market Pulse survey found that IT organizations are questioning their long-term viability as a professional computing tool, citing limitations around functionality, durability and ... (more)
Her ox was gored. Senate Intelligence Committee Chairwoman Sen. Dianne Feinstein is angry, charging that the CIA has turned on lawmakers.
Being the hacker consultant for "House of Cards" sounds like a great job, but it has its limitations: You can control the rats, but not the guinea pigs.
Employees arrange shopping carts in lines for customers at a Target Corp. store in Chicago last year.
Since the dawn of the computing age, hackers and network security professionals have been in a constant tug of war between advancements and innovation, success and failure.