It's something of a truism, that 'old viruses never die', and that certainly seems to be the case for some of the...
On Wednesday we heard additional documents had been leaked from the Arizona Department of Public Safety (DPS). “Will this ever end?” has...
Facebook recently launched a facial recognition feature that allows you and others to “tag” photos with your name. As has been the...
In a ComputerWorld article Gregg Kaiser cites a Microsoft engineer as saying that the trojan that Microsoft calls “Popureb” digs so deeply...
"Infrastructure Attacks: The Next Generation?" now includes the speaker notes, which hopefully makes it more interesting and useful.
The Obama administration seems intent on pushing for stiffer sentences for hackers caught endangering national security to 20 years prison time, doubling...
Introduction LinkedIn is a social network platform whose specialty is connecting professionals together to build relationships and create business opportunity. Recently the...
...It's a 419 (Advance Fee Fraud) message, of course. Stripped of the pseudo-governmental flim-flam, the core of the message is that they...
Mt. Gox, the most popular Bitcoin exchange, has had a database compromised and user information stolen, sparking rapid devaluation and temporary exchange...
Or so the current legislation being proposed in a U.S. House of Representative subcommittee would like it. A hearing scheduled for today...
As website appear to fall to hacks like the rain falls in Seattle, the question du jour doesn’t change from day to...
...the 'next Stuxnet' probably won't be any such thing, whatever we may choose to call it...
In the absence of any detailed information from the IMF itself, it's not surprising that most of the surmise around the attack...
...on the Twitter account owned by LulzSec that they had turned their attention to the NHS. Curiously enough, they seem to have...
...here's a blog in stark contrast to Urban Schrott's blog about good password practice in Ireland ... Troy Hunt ran an analysis...
First: a link to another article for SC Magazine's Cybercrime Corner on password issues: Good passwords are no joke. However good your...
...whatever the hacker community's personal taste is in games and consoles, gamers are a tempting target...
Bitcoins, a self-generated hash-based peer-to-peer currency with no centralized regulating body, are on a stratospheric trajectory, will it replace traditional legal tender...
It appears North Korea is expanding their cyber warrior savvy in a plan that includes sending the best and brightest of young...
The MacDefender malware has morphed again, now taking the guise of "MacShield." As in the case of its oldest sibling MacDefender,...
Cyber Security pundits have been keenly watching the development of nascent state targeted attacks such as the Stuxnet worm with interest for...