Old Articles: <Older 3071-3080 Newer> |
|
InternetNews April 8, 2010 |
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. |
National Defense May 2010 Stew Magnuson |
Russian Cyberthief Case Illustrates Security Risks For U.S. Corporations While the federal government and Congress are making a push to toughen up the nation's defenses in cyberspace, most of the vulnerabilities that thieves and spies are exploiting through the Internet are in the private sector. |
InternetNews April 6, 2010 |
Vietnam Dismisses Google's Malware Allegations Vietnamese official calls claims by Google and McAfee of a widespread cyber attack against dissident activists "groundless," while China issues a similar denial of an unrelated report of cyber crime in that country. |
InternetNews April 5, 2010 |
Facebook Scam Takes Aim at Whole Foods Fans Scammers target Facebook fans of Whole Foods Market grocery store, promising a $500 gift card, but they're really out to swipe users' personal information. |
InternetNews April 5, 2010 |
Security Experts: 'Malware Like a Sniper' A panel of security experts had some grim news on the state of security. How does IT prepare for what's coming? |
InternetNews April 2, 2010 |
Mozilla Rushes Out Fix for Firefox Hack When white hat hackers point out flaws in your product, it's for your own good and you should take advantage of it before the bad guys do. |
InternetNews April 2, 2010 |
Report Tracks the Latest Trends in Cybercrime Sophisticated campaign tracking and dramatically increased use of social networking technologies were two of the top trends in cybercrime in 2009. |
Popular Mechanics April 2, 2010 Seth Porges |
The iPad Etiquette Handbook When the heck will it be appropriate to whip one of these babies out? In other words: What will be proper iPad-iquitte? |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
IEEE Spectrum April 2010 Mark Anderson |
Torturing the Secret out of a Secure Chip A trick for subverting secure transactions and their power supply is publicized so the bad guys can't exploit it |
<Older 3071-3080 Newer> Return to current articles. |