Operation Shady RAT: Canadian targets among those hacked

Every company in every conceivable industry is compromised by hackers - or will be­ shortly - according to a report from McAfee, a major maker of cybersecurity software."I am convinced that every company

Published on: August 3rd, 2011 John Ribeiro and John P. Mello Jr.

Hackers can decrypt secure traffic from un-patched iPhones

Almost anyone can snoop the secure data traffic of un-patched iPhones and iPads using a recently-revised tool, a researcher said today as he urged owners to apply Apple's latest iOS fix.The nine-year-old bug

Published on: July 29th, 2011 Gregg Keizer

A Minnesota man has been sentenced to 18 years in prison after he hacked a neighbor's Wi-Fi router and then launched a vengeful two-year campaign to frame them with child pornography and threats

Published on: July 14th, 2011 John Cox

Spammers abusing domain parking services on a massive scale

By Nick Johnston Domain parking, the act of registering an Internet domain name without placing any content on the website, is a common practice for a business website in the pre-launch stage. These

Published on: June 7th, 2011 IDG News Service

Windows users falling prey to social engineering tactics

The next time a web site says to download new software to view a movie or fix a problem, think twice. There's a pretty good chance that the program is malicious.In fact, about

Published on: May 19th, 2011 Robert McMillan

Three insider threats to watch out for

Why does your competitor have your latest research or financial figures? It must be an insider -- or is it?Before the digital revolution, security professionals were kept awake at night worrying about the

Published on: May 13th, 2011 Jeffrey R. Jones and Ryan Averbeck

Video Rewind: An overview of common online threats

Osama bin Laden's death in a U.S. commando raid on his hideout in Abottaba, Pakistan has the Internet ablaze with discussions and speculations in the last couple of days.Not surprisingly, the amped up

Published on: May 3rd, 2011 ITBusiness Staff

PlayStation Network breach timeline: from compromise to compensation

This is a timeline of major events associated with the attack on Sony's PlayStation Network and Qriocity online services.Dates are given relative to the location the events took place. Sony announcements, released globally,

Published on: May 2nd, 2011 Martyn Williams

10 Internet threats you want to know about

By Claudiu Popa From the moment we unwrap that shiny new cell phone or unpack a new, user-friendly computer we are presented with opportunities to ‘get online’ and ‘look at stuff’. Indeed that

Published on: April 15th, 2011 Claudiu Popa

Chinese hackers: the root of all evil, or an obvious scapegoat?

By Claudiu Popa  The Chinese are apparently after our law firms now. They weren’t content to hack Google and the Pentagon. After those hacking attempts on our federal government’s Finance and Treasury Board

Published on: April 8th, 2011 Claudiu Popa

Corporate espionage fuels underground cybercrime economy: McAfee

Corporate espionage is a business almost as old as corporations, but thanks to the Internet revolution it has a new business model: cybercrime. A new report from McAfee illustrates how intellectual property and trade

Published on: March 29th, 2011 Tony Bradley

Top 5 security threats to watch out for this year

Online malicious activity was a major headache in 2010, and so far, 2011 is no different: We've seen scams and malware on Twitter, Facebook, and the Android Market, as well as a rise

Published on: March 11th, 2011 Ian Paul

Hacking champion says Pwn2Own encourages exploit ‘weaponization’

Organizers of Pwn2Ownon Sunday defended the hacking contest's rules after a three-time winner criticized the challenge for encouraging researchers to "weaponize" exploits.The contest, which starts March 9, pits researchers against four browsers --

Published on: March 1st, 2011 Gregg Keizer

How to not get phished like the Canadian government

The cyber attacks on several key Canadian government offices reported yesterday were not much different from spear phishing and online social engineering incidents reported by typical computer users, according to security specialists. But

Published on: February 18th, 2011 Nestor Arellano