Black and gray markets for computer hacking tools, services and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments and individuals, according to a new RAND Corporation study.
In September 2013, we ran a live server exploitation exercise to see how long an unpatched and minimally configured cloud server instance could survive against financially motivated attackers when connected directly to the Internet. The exercise, referred to as The Gauntlet throughout the capture-the-flag-style contest, ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.
A hacker group based in Germany says it has managed to crack Apple's new Touch ID biometric security system with a modified fingerprint lifting method and a "fake finger" creation technique.
Syrian Electronic Army (SEA) hackers "broke into" Melbourne IT, an Australian Internet services company that claims Twitter and the New York Times as its customers.
The Washington Post, Time, and CNN are not only forced to use Outbrain like the rest of us traffic desperate sites, but they have also been unceremoniously attacked by people who still find time to commit massacres between keystrokes. Sad state of journalism in this country grows worse.
The Angel Health monitor, besides having a fairly morbid name (you rarely see angels unless you’re sailing down the river Styx), is actually quite cool. Designed to be a “developer’s” health monitoring system, the Angel senses motion and acceleration, skin temperature, blood oxygen saturation, and heart rate. Created ...
The cyberscare, like the redscare or the greenscare of the ’90′s, is already under way. We’ve seen it take root with the fierce federal persecution of Aaron Swartz, the hefty charges and prison sentence facing LulzSec hacktivist Jeremy Hammond and the three-year jail sentence handed down to Andrew ...
When lock maker Schlage imprinted the words “do not duplicate” across the top of the keys for their high-security Primus locks, they meant to create another barrier to reproducing a piece of metal that’s already beyond the abilities of the average hardware store keymaker. One group of hackers,
Cybersecurity researchers are getting more worried that focusing on "rational" attackers such as the Chinese might be a dangerous way to go, and the country needs to fear the irrational types more.
A team of hackers who previously managed to design a custom chip that circumvented security protocols on Nintendo's Wii console say they have created a similar key for the recently launched Wii U.
US Republican senator Mike Rogers has found himself at the centre of a geek storm after he dubbed opponents to his controversial cybersecurity bill as teenagers in their basements.
Russian hackers have worked out a way that they can gain free access to Ubisoft's online game offerings.
The stereotype of a hacker being antisocial man-children who live in their parents' basements is apparently true, according to a new study from the University of Montreal.
China's Defense Ministry has accused the US of repeated cyberattacks on its website, along with a People's Liberation Army news site.
Apple has positively identified a strain of malware which infected a limited number of Mac systems via a vulnerability in the Java plug-in for browsers.
Project Blitzkrieg - a hacking attack against US bank customers threatened for early next year - is a genuine danger, according to security researchers at McAfee.
Facebook has rolled out HTTPS security across the site, meaning it may be a little slower - but a lot safer.
GFM Films recently posted the first piece of concept art for its proposed Neuromancer adaptation.
Writer-director Vincenzo Natali is reportedly looking for stars to fill out his attempt at adapting the classic cyberpunk novel.
Hackers linked to the Anonymous collective have breached the digital perimeter protecting the Department of Justice (DoJ) network.