2 hrs ago | Computer Weekly
Hackers typically target privileged admin accounts to gain access to all computer systems in an organisation, says David Higgins, senior sales manager Cyber-Ark "In many organisations, these accounts are not well managed or controlled, giving hackers unfettered, unaccountable access," he told the Whitehall Media Identity Management 2013 conference ... (more)
6 hrs ago | International Business Times
Cybercriminals are exploiting the Facebook API, the interface that allows developers to create apps for Facebook, to spread malicious links to groups all over the social network, and Facebook is doing nothing to stop it.
10 hrs ago | Herald Star Online
A central Kentucky man who goes by the online name KyAnonymous said Tuesday he is the target of an investigation into who hacked into an Ohio high school's computer and posted a video related the rape of a teenage girl at an alcohol-fueled party.
12 hrs ago | This is Dorset
She's not known for excessive swearing or rude jokes, but visitors to the Peppa Pig World Facebook page have been getting a bit of a surprise over the last two days.
Sentencing has been postponed for an Ohio man who claimed to have hacked into the University of Pittsburgh's computer system.
A woman who worked as a stunt double for Angelina Jolie sued Rupert Murdoch's News Corp. in Los Angeles on Tuesday, claiming she's a victim of a phone hacking scheme to obtain information about the actress.
Deric Lostutter of Winchester told The Associated Press on Tuesday that he leaked documents related to the investigation.
This June 9, 2013 photo provided by The Guardian newspaper in London shows Edward Snowden, who worked as a contract employee at the U.S. National Security Agency, in Hong Kong.
Grocery store chain Raley's and Nob Hill announced on June 6 that it was the victim of a cyber attack and customers' credit card numbers may have been accessed.
SAN FRANCISCO, CA, Jun 17, 2013 -- Award-winning tech startup, StopTheHacker, is thrilled to announce the addition of their vulnerability patching service to its long list of tech services.
Hackable? A US security expert says he has found a way to remotely attack high-end surveillance cameras.
As data dragnets and information breaches dominate the news, states are scrambling to cash in on a rapidly expanding business sector by offering tax incentives to firms that protect sensitive information from outside attacks.
NEWS ANALYSIS: Cyber-sleuths use tools that appear to have come straight out of a science fiction movie in their quest to detect attacks in time to raise defensive shields.
If you listen to this recent podcast , you willl get a good understanding of just how big a threat hackers are becoming.
For decades, it's been making computer users miserable. It's like the common cold.
The Guardian newspaper says the British eavesdropping agency GCHQ repeatedly hacked into foreign diplomats' phones and emails when the U.K. hosted international conferences, even going so far as to set up a bugged Internet cafA© in an effort to get an edge in high-stakes negotiations.