Hotmail in hot water over password flaw, rushes fix
Chip and pin terminals shown to harvest customer info
Bank account-draining Zeus gets lots of action in 2013
Online game theft earns real-world conviction
(AP) -- The amulet and mask were a 13-year-old boy's virtual possessions in an online fantasy game. In the real world, he was beaten and threaten with a knife to give them up.
In info age, Belgian diamond heist is a throwback
(AP)—At a time when many robberies take place at the click of a mouse, a group of jewel thieves has shown there's still a potential payoff for old-fashioned criminals willing to use disguises, planning ...
Inspired by nature, researcher develops new cyber security techniques
(Phys.org) —Imagine a cyber world in which hackers, identity thieves, spammers, phishers, foreign spies and other miscreants have a much tougher time plying their trade. Thanks to UC Irvine computer science ...
Hushed hoarders and prying pilferers
In order to prevent other birds from stealing the food they are storing for later, Eurasian jays, a type of corvid, minimizes any auditory hints a potential pilferer may use to steal their cache (food that ...
The high price of data breaches
As consumers, we transmit valuable personal information to the companies with which we do business. In doing so, we trust that information will remain secure. Over the past year, however, we have learned of a number of instances ...
Credit card fraudsters quickly exposed
Most people feel safe from fraudsters if their credit card is safely tucked away in their wallet. But they shouldn't: in most cases, thieves only need card numbers and information. A new software can provide ...
Target offers credit monitoring after data breach
Target Corp. is offering some of its Canadian customers a year of free credit monitoring after a massive security breach at its U.S. stores put confidential details into the hands of thieves.
Apple, Google defend privacy practices to Congress
Apple and Google, facing questioning from skeptical US lawmakers, defended their privacy practices before a congressional committee on Tuesday.
Study Looks Inside the Minds of Identity Thieves
(PhysOrg.com) -- The Federal Trade Commission recently asked a UT Dallas criminology researcher for help understanding what motivates identity thieves.
South African farmer equips sheep with cell phones
A South African farmer is fielding phone calls from his sheep, after equipping them with cell phones to keep tabs on the flock amid recent livestock thefts, according to local press Wednesday.