Hotmail in hot water over password flaw, rushes fix
BMW forced to respond to BBC report showing its cars at easy risk of being stolen
The high price of data breaches
As consumers, we transmit valuable personal information to the companies with which we do business. In doing so, we trust that information will remain secure. Over the past year, however, we have learned of a number of instances ...
Bank account-draining Zeus gets lots of action in 2013
Freebie tricksters unleash spam botnet using Android phones
Short-duration clock approach thwarts RFID attacks
Apple, Google defend privacy practices to Congress
Apple and Google, facing questioning from skeptical US lawmakers, defended their privacy practices before a congressional committee on Tuesday.
Sophisticated cyber thieves behind Epsilon attack
An online marketing firm hit by what may be one of the biggest data thefts ever was the victim of "highly sophisticated cyber thieves," according to its parent company.
The usual suspects: Identifying serial offenders and their crimes
Research conducted by psychologists at the University of Leicester and by Northamptonshire Police has found that criminals have their own distinctive 'local haunts' when committing crime.
Design could help Facebook members limit security leaks
A sign-up interface created by Penn State researchers for Facebook apps could help members prevent personal information -- and their friends' information -- from leaking out through third-party games and apps to hackers and ...
South African farmer equips sheep with cell phones
A South African farmer is fielding phone calls from his sheep, after equipping them with cell phones to keep tabs on the flock amid recent livestock thefts, according to local press Wednesday.
Target offers credit monitoring after data breach
Target Corp. is offering some of its Canadian customers a year of free credit monitoring after a massive security breach at its U.S. stores put confidential details into the hands of thieves.
Inspired by nature, researcher develops new cyber security techniques
(Phys.org) —Imagine a cyber world in which hackers, identity thieves, spammers, phishers, foreign spies and other miscreants have a much tougher time plying their trade. Thanks to UC Irvine computer science ...
Hushed hoarders and prying pilferers
In order to prevent other birds from stealing the food they are storing for later, Eurasian jays, a type of corvid, minimizes any auditory hints a potential pilferer may use to steal their cache (food that ...