Long known for its out-and-out censorship, Beijing now appears to be filling Chinese social media with pro-government messages. The new tack was on full display after the Thursday indictment of fallen Communist Party member Bo Xilai, who was busted for corruption and abuse of power in 2012. While Ch...
Adobe Reader and Oracle Java aren't alone in having a bull's eye painted on their code. WordPress also is becoming a popular target for Internet outlaws. It's quite a large target, too. About 18 percent of the sites on the Web -- about 60 million of them -- use WordPress. One reason WordPress is att...
A coalition comprising Microsoft, the FBI, financial industry companies and technology firms has taken out more than 1,400 botnets that used the Citadel Trojan to steal victims' online banking information and information about their identities. "This was a lengthy process, and we relied heavily on o...
Chances are you've never heard of the tiny Pacific island nation of Palau, but you may be familiar with its former Internet domain: PW. That's because the domain, now owned by Directi, has become a favorite of spammers. According to Fort Systems, Directi -- which christened PW "Professional Web" -- ...
Protecting Internet information has become a costly enterprise, with worldwide spending on security estimated at $60 billion in 2012. That figure will grow to $86 billion by 2016, according to a Gartner study. To help ensure that those investments are being spent wisely -- and to keep technology a s...
Cybersecurity news had a distinctive international flavor last week. In South Korea, a cyberattack from unknown sources disrupted portions of the nation's banking and broadcast industries. During the attacks, a North Korean Human Rights website based in Washington, D.C. was also defaced. Because of ...
Three banks and three broadcast networks in South Korea were hit Wednesday by a virus that froze their computers and shut down a related website. Seoul is looking into the attacks, but has declined to blame North Korea until investigations prove otherwise. It has boosted vigilance in the public and ...
Phishing and spear phishing have long been thought to be mutually exclusive hacking tricks, but cybercrooks have found a way to combine the two in a technique called longline phishing. "The technique allows you to hit a lot of people very quickly and largely go undetected," said Dave Jevans, founder...
After taking it on the chin for its alleged attacks on U.S. media outlets -- and for its army reportedly backing hackers engaged in cyberespionage around the world -- China returned fire. The government claimed its defense and military ministries' websites are being bombarded with 144,000 hacking at...
Do you dread calling a company to get customer support? Most of us do. We are on hold forever and the problem drags on way too long, leaving brand loyalty damaged. Some companies are solving that problem by partnering with Support.com -- building customer loyalty, developing a competitive advantag...
Daily
Several times a week
Occasionally
Never
I can't tell when apps use AI
Enter your Username and Password to sign in.