Cybercrime & Hacking - News, Features, and Slideshows

News

  • Duqu 2.0 hackers may have cracked Kaspersky to recon research

    Eugene Kaspersky, the Russian whose namesake company acknowledged that it had been infected with top-tier malware, struggled during a press conference to come up with reasons why the hackers targeted his firm.

    Written by Gregg Keizer12 June 15 00:59
  • Sony hackers targeted employees with fake Apple ID emails

    Hackers probably gained access to Sony's network last year after a series of phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs, a security expert said today.

    Written by Gregg Keizer24 April 15 04:47
  • House bill slashes research critical to cybersecurity

    A U.S. House bill that will set the nation's basic research agenda for the next two years increases funding for computer science, but at the expense of other areas important to cybersecurity.

    Written by Patrick Thibodeau23 April 15 07:14
  • Researchers uncover signs of Superfish-style attacks

    Researchers at the Electronic Frontier Foundation (EFF) yesterday said that they had found evidence that implies attackers have exploited a security vulnerability in the Superfish adware and a slew of other programs.

    Written by Gregg Keizer27 Feb. 15 03:48
  • Google scrubs Pwnium hack contest

    Google yesterday said it would shut down its Pwnium hacking contest, which it has held alongside the better-known Pwn2Own challenge each spring since 2012.

    Written by Gregg Keizer26 Feb. 15 05:27
  • FBI probes for source of fraudulent TurboTax filing spike

    The Federal Bureau of Investigation (FBI) is looking into the cause of a spike in fraudulent tax returns filed using Intuit's TurboTax tax preparation software, according to a report by the <em>Wall Street Journal</em>.

    Written by Gregg Keizer12 Feb. 15 08:13
  • After FBI blames North Korea for Sony attack, now what?

    The FBI today named the North Korean government as responsible for the cyber attack against Sony Pictures last month, saying its technical analysis points to the isolated, Communist country.

    Written by Gregg Keizer20 Dec. 14 07:27
  • Senate's torture report will provoke hacktivist reprisals

    The release Tuesday of the U.S. Senate's report that excoriated the Central Intelligence Agency for torturing suspected terrorists will result in retaliation by cyber-hacktivist groups, a security expert predicted today.

    Written by Gregg Keizer11 Dec. 14 07:28
  • Hackers compromised nearly 5M Gmail passwords

    Security experts are urging Gmail users to change their passwords amid reports that hackers gained access to the credentials of 5 million users of the free email service. Some password combinations have been spotted on Russian cybercrime forums.

    Written by Sharon Gaudin11 Sept. 14 07:44
  • Home Depot confirms breach

    After nearly a week of investigation, Home Depot on Monday confirmed that intruders had indeed broken into its payment networks and accessed credit and debit card data belonging to an unspecified number of customers who shopped at its U.S. and Canadian stores.

    Written by Jaikumar Vijayan09 Sept. 14 08:23
  • Data shows Home Depot breach could be largest ever

    It looks like Home Depot may have earned the dubious distinction of being responsible for the biggest compromise ever involving credit and debit card data.

    Written by Jaikumar Vijayan04 Sept. 14 06:44
  • Feds issue bulletin warning about malicious 'Google dorking' cyber actors

    If you are good at research by using Google searches, does that make you a malicious cyber actor? Of course not, but DHS, FBI and NCTC (National Counterterrorism Center) have issued a bulletin warning about malicious "Google dorking" cyber actors. If using <a href="https://sites.google.com/site/gwebsearcheducation/advanced-operators">advanced search techniques</a> on Google or Bing is considered suspicious, what does that make <a href="http://www.shodanhq.com/">Shodan</a> users who specifically target SCADA, ICS, VoIP, routers, switches, webcams and printers to name but a few?

    Written by Darlene Storm27 Aug. 14 02:40
[]