Stolen-data trove offers look inside a botnet
(AP) -- Getting hacked is like having your computer turn traitor on you, spying on everything you do and shipping your secrets to identity thieves.
(AP) -- Getting hacked is like having your computer turn traitor on you, spying on everything you do and shipping your secrets to identity thieves.
Software
Mar 15, 2009
0
0
(Phys.org)—Bromium has announced the availability of a product intended to make a significant difference in how enterprises cope with relentless attempts to attack their systems with malware, burdening IT departments and ...
Microsoft raced to fix an anti-virus program that targeted Google's Chrome browsing software as a malicious threat and kicked it off computers.
Software
Oct 1, 2011
16
0
With the threats of cybercrime, cyberterrorism and cyberwarfare looming over our hyper-connected world, the best defense for the U.S. might be a good offense, says new research by a University of Illinois expert in technology ...
Internet
Jun 27, 2011
5
0
Finally the world has a hacker-proof communications device. The bad news? It's a brick in a glass case. The joke, told to a cyber conference Tuesday in New York, illustrates what top US experts describe as the dire state ...
Internet
Aug 4, 2010
1
0
Microsoft on Monday blocked access to thousands of Hotmail accounts in response to hackers plundering password information and posting it online.
Internet
Oct 5, 2009
0
0
Japanese defence contractor Mitsubishi Heavy has been hit by over 50 separate computer viruses in a series of cyber attacks so far this year, a report said Monday.
Internet
Oct 10, 2011
0
0
Two Latvians have been indicted and dozens of computers and servers seized in the United States and Europe in a crackdown on international cybercrime, the US Justice Department said Wednesday.
Internet
Jun 23, 2011
0
0
Hackers are out to trick Apple computer users into infecting Macintosh machines with malicious code pretending to be legitimate security software.
Internet
May 26, 2011
3
0
(PhysOrg.com) -- Long considered the shining example of computer security, Apple Macintosh computers are becoming serious targets of cyberattacks, according to Indiana University Center for Applied Cybersecurity Research ...
Software
May 25, 2011
0
0