Computer attacks linked to wealthy group or nation

(AP) -- A powerful computer code attacking industrial facilities around the world, but mainly in Iran, probably was created by experts working for a country or a well-funded private group, according to an analysis by a leading ...

Hackers exploit Twitter security flaw

Twitter apologized to its millions of users on Tuesday after hackers exploited a security hole and wreaked havoc on the microblogging service.

Worst cyber attack on US military came via flash drive

The most serious cyber attack on the US military's networks came from a tainted flash drive in 2008, forcing the Pentagon to review its digital security, a top US defense official said Wednesday.

Slovene police, FBI hail ties in cyber crime probe

(AP) -- An FBI official said Friday a two-year-long multinational investigation led them to nab a 23-year-old Slovenian, who allegedly created a malicious software code that infected 12 million computers worldwide.

Cyber mastermind arrested, questioned in Slovenia

(AP) -- A cyber mastermind from Slovenia who is suspected of creating a malicious software code that infected 12 million computers worldwide and orchestrating other huge cyberscams has been arrested and questioned, police ...

Nitro PDF Reader out to blow away Adobe

Nitro PDF Software on Tuesday released a free reader built to break rival Adobe System's grip on the world's top digital document format.

Hacker scam targets iPad owners: BitDefender

Software security firm BitDefender warned Tuesday that hackers are trying to trick iPad owners into infecting personal computers with a power-seizing virus.

Web browsers and iPhone hacked at contest

(PhysOrg.com) -- Hackers had a field day on the first day of the Pwn2Own contest, successfully attacking Safari, iPhone, Internet Explorer, and Firefox. The Pwn2Own contest is an annual event that encourages security specialists ...

In networks we trust

(PhysOrg.com) -- European researchers are proposing a paradigm-shifting solution to trusted computing that offers better security and authentication with none of the drawbacks that exist in the current state of the art.

page 7 from 8