Is it wrong that accused Lizard Squad hacker Julius Kivimaki, a teenager who was convicted of 50,700 "instances of aggravated computer break-ins" attacks, gets to walk away without having to serve any jail time?
Warning: All versions of Flash Player are vulnerable to a zero-day, weaponized exploit that became public when Italian spyware vendor Hacking Team was hacked, and 400 GB of corporate data leaked. Adobe has released an update to patch the flaw.
MasterCard is testing a smartphone app that lets users approve online transactions using facial recognition, via the equivalent of taking a selfie. But could such technology be spoofed, and will it reduce card fraud?
An unconfirmed post-breach report for bitcoin exchange Bitstamp shows the organization was targeted by a sustained attack that combined phishing via email and Skype with macro malware to successfully steal almost 19,000 bitcoins, worth $5 million.
Indian Prime Minister Narendra Modi has kicked off the Digital India Week with the launch of the DigiLocker data storage initiative for citizens. What are preliminary reactions from the security community?
Trump Hotel Properties confirms it is investigating reports of card fraud tied to multiple hotels. Numerous hotels, restaurants and retailers continue to report breaches, stemming from POS malware infections.
Cisco announced plans to pay $635 million to purchase cloud security firm OpenDNS to better secure the "Internet of Everything." OpenDNS says the acquisition will leave its products and personnel intact.
The Data Security Council of India has confirmed the appointment of Nandkumar Saravade as its new Chief Executive Officer. What is Saravade's immediate agenda, and how is this announcement being received?
European authorities say they have disrupted a Ukraine-based cybercrime gang tied to $2.2 million in fraud in Europe, the United States and beyond, perpetrated via banking Trojans, botnets and hacking-for-hire services.
A growing number of ATM card reader eavesdropping attacks involve attackers getting in through a tried-and-true method - taking advantage of commonly used electronic access keys or codes. What can be done to stop these attacks?