More Cybercrime and Hacking News
Oracle is planning to release 115 security patches for vulnerabilities affecting a wide array of its products, including its flagship database, Java SE, Fusion Middleware and business applications.
In the battle to keep your personal information private, it's not just hackers you have to worry about but lax security and stupidity.
The source code for an impressively small but capable malware program that targets online bank accounts has been leaked, according to CSIS Security Group of Denmark.
Apple users accessing Gmail on mobile devices could be at risk of having their data intercepted, a mobile security company said Thursday.
Police from eight countries together with several private security companies disrupted the online infrastructure used by cybercriminals to control computers infected with a malware program called Shylock.
The Department of Homeland Security mistakenly released details on an experiment in which a 27-ton generator was destroyed via a cyberattack.
Thousands of compromised computers are actively trying to break into point-of-sale (POS) systems using brute-force techniques to guess remote administration credentials.
Notorious Russian leaker Wzor denied any link between the publication of internal Microsoft info and a former employee who stole trade secrets.
U.S. National Security Agency whistleblower Edward Snowden has applied for extended asylum in Russia, according to news reports.
An antispam organization is pushing for quick law enforcement action against five people it alleges took part in one of the largest cyberattacks on record that caused Internet outages throughout Europe early last year.
A sophisticated Chinese hacker group that had been stealing information from U.S. policy experts on Southeast Asia suddenly changed targets last month to focus on Iraq, security researchers said Monday.
The Social Security numbers of roughly 18,000 California physicians and health-care providers were inadvertently made public after a slip-up at health insurance provider Blue Shield of California, the organization said Monday.
A Russian man suspected of hacking into point-of-sale systems at U.S. retailers has been arrested and faces charges in a U.S. court, the Department Justice said.
Attackers injected malicious code into Dailymotion.com, a popular video sharing website, and redirected visitors to Web-based exploits that installed malware.
A Nevada-based company has regained control of the majority of domains seized by Microsoft in a legal action aimed at shutting down botnets.
Restaurant chain P.F. Chang's China Bistro says the theft of credit and debit card information from some of its restaurants earlier this year was "part of a highly sophisticated criminal operation."
Data breaches at retailers and financial services companies exposed 14 percent of all U.S. debit cards in 2013, according to a nationwide survey by a major ATM network operator.
A critical vulnerability found in a WordPress plug-in that has been downloaded over 1.7 million times allows potential attackers to take complete control of blogs that use it.
Hackers recently broke into payment systems at several northwestern U.S. restaurants and food service companies via a remote access account belonging to one of their vendors, another example of the need for companies to monitor third-party access to their networks.
Microsoft's tactics in using a court order to seize nearly two-dozen No-IP.com domains it said were used to distribute Windows malware tools were called ham-handed by several critics.
Computerworld has launched its annual search for outstanding IT leaders who align technology with business goals. Nominate a top IT executive for the 2015 Premier 100 IT Leaders awards now through July 18.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- SBIC: Transforming Information Security
- This report combines perspectives on technologies with experience in strategy to help security teams navigate complex decisions regarding technology deployments while maximizing investments.
- Is Your Credit Card Data Safe from Hacks?
- News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What...
- Protecting Your Mid-Size Business from Today's Security Threats
- Think you're too small to get hacked? Think again.
- CSO QuickPulse IT Security: Midsize Businesses Face Enterprise
- This survey finds that midsize firms lack understanding of vulnerabilities, and need comprehensive security tools.
- The Importance of Reputation
- Proactive enterprise security involves turning data into actionable information--that's where reputation comes in. All Cybercrime and Hacking White Papers
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed in recent years, and it continues to escalate.
- PST Archiving: What is it and How is it Done? Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10...
- HP DevOps KnowledgeVault This interactive resource focuses on the evolution taking place in the world of software development, specifically the Agile development framework, and the gap...
- Introducing Cloud-Based Disaster Recovery From VMware Cost-effectively protect your business applications in the case of a local disaster or disruptive event. VMware is excited to introduce vCloud Hybrid Service...
- All Cybercrime and Hacking Webcasts