Cybercrime | News, how-tos, features, reviews, and videos
Explore related topics
The Cybersecurity Assurance Program uses a new set of standards to test network-connected products for software flaws
Researchers improve the BREACH attack to extract sensitive data from encrypted HTTPS connections faster
The FBI did not commit on using the method tried on the San Bernardino iPhone
The malware may be linked to a known cyberespionage group that targets companies with interests in Taiwan
The tool tricks Locky, TeslaCrypt, and CTB-Locker ransomware into believing that computers are already infected
The ransomware is distributed by emails masquerading as job applications
The PowerWare ransomware is written completely in the Windows PowerShell scripting language
An intruder to Verizon Enterprise stole contact data on customers -- maybe as many as 1.5 million
The DOJ says the campaign that included DDoS attacks was carried out on behalf of the Iranian government
The stealthy USB Thief Trojan makes extensive use of cryptography to hinder analysis and hide data