The CEO of a Pakistani firm that developed a mobile spyware application called StealthGenie has pleaded guilty to U.S. charges of selling an illegal "interception device." Find out why one observer says the case could be precedent-setting.
European privacy watchdogs say Google and other search engines must comply with "right to be forgotten" link-removal requests not just on their European sites, but across all of their sites, raising fears of EU censorship run amok.
A year after Facebook received a bug report regarding a loophole in its app architecture, the vulnerability remains exploitable, says the researcher who discovered this potential threat to user privacy.
A new U.K. government report accuses social networks of serving as a "safe haven for terrorists," inflaming what some see as tense relations in the post-Snowden era between the British government and Silicon Valley.
A massive international operation has resulted in the arrest of 118 people suspected of using stolen card data to buy airline tickets, or using fake tickets, thanks to big data capabilities for combating crime.
The Syrian Electronic Army hacker collective has claimed credit for hacking into an advertising network used by a number of media sites, as well as disrupting access to more than 80 websites.
While security experts are predicting a significant uptick in point-of-sale attacks, as usual, during the holiday shopping season, they say retailers are better prepared to fight fraud because they've beefed up security.
Anti-virus firms Symantec, F-Secure, and Kaspersky Lab have been criticized for not issuing public alerts more quickly about powerful Regin espionage malware that has capabilities that reportedly rival Stuxnet and Flame.
The U.S. Postal Service on Nov. 10 confirmed a data breach that affected some of its information systems. This infographic offers a timeline of the breach investigation provided by an official during a Congressional hearing.
Less than 48 hours after warnings first surfaced about espionage malware called "Regin," debate rages over who's been running the related attack campaigns, for what purpose, and if anti-virus vendors should have sounded warnings more quickly.
Cybercriminals are perfecting the automated systems they use to verify stolen debit and credit card data by exploiting charitable websites. Learn why these sites are so-called soft targets for hackers.
WordPress says users of versions 3.9.2 and earlier of its website content management software need to patch a critical cross-site scripting vulnerability, which could enable anonymous users to compromise a site.
Stealth espionage malware known as 'Regin' or 'Regis' has been targeting government agencies, businesses and research institutes, with Russia and Saudi Arabia as prime targets, researchers say. But it's unclear what nation is behind the attacks.
Spurred, in part, by cloud computing, the amount of federal data finding its way onto computers outside of the government is soaring. To ensure data security, NIST is drafting guidance to standardize safeguards of federal data stored on nonfederal computers.
Citadel financial malware has been upgraded to steal master passwords for software designed to securely store lists of usernames and passwords, according to IBM's Trusteer unit. Security experts offer insights on how to respond to the threat.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.