Cyber Crime

Cyber Crime news, information, and how-to advice

Enemies no more, McAfee and Symantec agree to share threat data

Pair join Fortinet and Palo Alto in the recently launched Cyber Threat Alliance aimed at tackling cyber security threats

What you need to know about the Home Depot data breach

Here's a quick run down on the data breach that impacted debit and credit cards used at the world's largest home improvement retailer


Heartbleed to blame for Community Health Systems breach

It's the first time Heartbleed has been linked to an attack of this size and type

Many Chrome browser extensions do sneaky things

A study of 48,000 Chrome extensions uncovers ad fraud, data theft, and other misdeeds

Why would Chinese hackers want hospital patient data?

Medical records data can be a valuable asset, especially in a country where many have no health insurance

The Zeus botnet and the making of a cyber crime market

Competition between makers of ZeuS and SpyEye malware reveals the business side of the criminal malware realm

New Gameover Zeus botnet growing in the U.S.

A new Gameover Zeus malware variant has infected over 10,000 systems so far, researchers say

McAfee sideshow eclipses Defcon's real security breakthroughs

The security pioneer's appearance at Defcon highlighted the best and worst impulses of the hacker community

On sale: False sense of Internet security, for the low, low price of $120

Is your name among the stash of 1.2 billion stolen passwords? An Internet security firm can tell you -- for pennies per day!

Don't panic: That Russian hack bombshell isn't what you think

News of 1.2 billion stolen Web credentials raises key questions about the data -- and the motives of the security researcher

5 reasons Internet crime is worse than ever

Why does Internet crime remain a menace? These five reasons have enabled us to accept it -- but that complacency may not last

How to protect personal, corporate information when you travel

Today's hotels are unfortunately vulnerable to types of attempted fraud. Here's how to keep data safe

Cyber criminals ride Google coattails in DDoS attacks

Cyber criminals are able to launch distributed denial-of-service attacks against websites by pretending to be Google Web crawlers

Stealthy 'Critroni' ransomware uses Tor, could replace Cryptolocker

The Cryptolocker takedown has led to a better designed, more resilient ransomware threat

5 big security mistakes coders make

Security errors are rife in application development. Here are five of the most egregious -- and common -- missteps

Botnet uses brute force to access PoS systems

A new malware threat scans the Internet for PoS systems and tries to access them using common usernames and passwords

CISA bill -- and Internet privacy rights -- moves to Senate for a vote

After clearing Senate Select Committee on Intelligence, cyber security bill now faces potentially contentious Senate vote

Watch out for these 5 summer scams

Put your feet up and let your hair down -- but don't let these security scams ruin your holidays

Latest cyber security bill riddled with Net neutrality loopholes

Critics attack CISA's vague wording for providing a backdoor route for mounting attacks on Net neutrality and privacy

Critical vulnerability in WordPress newsletter plug-in endangers many blogs

Attackers could exploit a flaw in the MailPoet Newsletters plug-in to take full control of vulnerable blogs, researchers from Sucuri said

Load More