A fledgling website created last fall connects hackers with clients willing to pay for their services. Nearly 50 hackers have listed their services on Hacker's List so far, for tasks including data recovery, penetration testing and computer forensics. More than 500 hacking jobs reportedly had been o...
Microsoft got a fiery start to 2015 when Google last week publicized a kernel vulnerability in Windows 8.1 Update. Google Project Zero's James Forshaw, who discovered the flaw, ranked it as a high-severity issue. Although Forshaw reported it to Microsoft last September, the company had not yet fixed...
The most successful phishing attacks manage to dupe their victims a full 45 percent of the time, according to a study released last week by Google. On average, phishing's success rate is about 14 percent, but even the most obvious scams still manage to lure 3 percent of the people targeted to a fake...
Privacy expert and Pulitzer Prize-winning journalist Ashkan Soltani will be the FTC's new chief technologist, FTC Chairwoman Edith Ramirez announced Tuesday. "Ashkan is well qualified and was an excellent choice for the agency," said Ginger McCall, an associate director with the Electronic Privacy I...
Attackers for months have been using eBay listings to redirect visitors to password-harvesting scam sites. They use cross-site scripting to hijack eBay shoppers and trick them into handing over personal data. Smartphones, televisions, hot tubs and clothing are among the items supposedly for sale in ...
The Gameover botnet is back, more or less, only six weeks or so after the Justice Department announced that an FBI-led multinational effort had disrupted it. Still, the botnet's downtime was longer than expected -- the UK's National Crime Agency had warned that the people running it would regain con...
CNN on Thursday became the latest media outlet to fall victim to hacking by the Syrian Electronic Army. The SEA hacked into and defaced various CNN social media accounts and blogs, the network's Catherine Shoichet reported. "Tonight, the #SEA decided to retaliate against #CNN's viciously lying repor...
If you're inclined to make resolutions this time of year and you're concerned about your online and offline security, here are some suggestions that can keep you safer in the days ahead. At the top of the list: You should vow to change the passwords to your important accounts on a frequent basis. "T...
The United States National Security Agency reportedly is using at least one type of Google cookie -- PREF, which stores a user's preferences -- to home in on the PCs of targets it wants to hack. NSA's Special Source Operations division, which works with private companies to slurp data from the Inter...
By duping an Internet innocent into making just one errant click, an online bandit can inflict a world of hurt. Socially engineered malware attacks attempt to deceive a user into downloading malicious software, typically through a link to an infected website. Since browsers play a key role in many S...
Ban
Regulate
Maintain status quo
Undecided
Enter your Username and Password to sign in.