Cybercrime | News, how-tos, features, reviews, and videos
Explore related topics
The proposed Cybersecurity Information Sharing Act would make us less secure
End-users are woefully unprepared to deal with phishing scams, social engineering schemes that are the cause of a lot of breaches
The good news: More than 83 percent of vulnerabilities had patches ready when the flaws became public
Flaw could make nearly half of Android devices vulnerable to an attack that modifies or replaces apps with malware that collects data
Weak authentication in Dell's System Detect utility could have enabled drive-by malware attacks
Even tech savants like Elon Musk could take a lesson from the Chinese government on how to cover up your bald-faced fibs and outright confabulations
Adobe Reader and Flash Player fell to security researchers as well
Security analysts last year saw a fake domain spoofing Premera's name
Even in light of broad government snooping, many people aren't aware of privacy tools like Tor or encryption
Privacy breach involves whois database that contains contact information for people who've bought domain names