2 hrs ago | International Business Times
A new Trojan malware infecting Android phones is capable of intercepting inbound text messages and forwarding them to hackers.
6 hrs ago | Canada.com
A federal court judge presiding over the robocall case ruled on Thursday that the fraudulent calls did not materially affect the results and declined to overturn them.
10 hrs ago | National Vulnerability Database
NVD is the U.S. government repository of standards based vulnerability management data.
10 hrs ago | ITWorld Canada
Attackers trying to steal intellectual property have been having it their way for some time.
10 hrs ago | Salon
Dozens of U.S. energy providers face "daily, constant or frequent" attempted cyber attacks, according to a new Congressional review of power grid safety.
14 hrs ago | MSNBC
British broadcaster ITV on Friday became the latest media outlet to have one of its Twitter feeds hacked by anonymous supporters of Syria's President Bashar al-Assad, just days after Twitter beefed up security to prevent such attacks.
14 hrs ago | CRN
The notorious Zeus Trojan, a family of banking malware known for stealing passwords and draining the accounts of its victims, has steadily increased in recent months, according to data collected by Trend Micro.
16 hrs ago | KSL-TV
Small businesses are being targeted by cyber criminals more frequently and experts say business owners aren't doing enough to keep it from happening to them.
20 hrs ago | ComputerWorld
Reddit is not just filled with pictures of cats and silly memes. Seriously. There's a lot of good content on the popular social news aggregator for network professionals whether you're focused on security, Windows, VoIP, IPv6 or a mixed bag.
Microsoft, whom is really the boss of the 'net, not the 'must connect once a day box', but the 'hackers' of the world unite World famous hacker 'Reckz0r' that cracked into CNN websites and data stream, claims via a 'pastebin' today, and other tweets that Xbox Live has been 'PWNED!' all 48 Million Users Exposed, and offer up a 6gb file with all the ... (more)
After the publication of the Mandiant report earlier in the year linking China's People's Liberation Army to ongoing and massive cyberattacks against U.S. corporations, government agencies, universities, and other organizations, policy makers and industry experts have been trying to figure out how to better secure their intellectual property ... (more)
Three 16-year-old Prescott High School students have been arrested on suspicion of hacking into teachers' computers and changing grades.
The market for Intrusion Prevention Systems will continue to grow on the back of more advanced designs and rising anxiety about the threat posed by advanced persistent threats , Frost & Sullivan has said.
With the microblogging site's new "two-factor authentication," users can choose heightened security.
Our cookies policy has changed. Review our cookies information for more details.
AngelHack, a premier educational technology events company, has just announced that the "biggest hackathon competition in the world" AngelHack , is now accepting applications for the AngelHack Accelerator Program, Summer 2013 cycle.
However, the ability to copy electronic code makes one-time pads vulnerable to hackers.
The bane of the computer security world is how long it takes to recognize and respond to new attack paradigms.