Hackers 

Hackers Steal Trade Secrets in 'Massive Cyber Attack' on German Manufacturer

The company said the attack involved 'organized, highly professional hacker activities.'

Hackers Expose Info on 87 Million Dailymotion User Accounts

In 18.3 million cases, the exposed data includes hashed passwords.

900,000 Deutsche Telekom Routers Disabled by Massive Cyber Attack

The routers were 'affected by an attack from outside,' the company said.

Hackers Hit Madison Square Garden, Radio City Music Hall, Beacon Theater, Chicago Theater, Michigan State University

The data potentially accessed ranges from students' names and Social Security numbers to credit card numbers and expiration dates.

Hack the Army - and Get Paid for It

The U.S Army is the next branch of the Department of Defence to embrace the bug bounty bounty model in an effort to improve security.

40,000 Tesco Bank Accounts Accessed by Cyber Thieves

In 20,000 cases, the bank says, the breaches resulted in 'money being withdrawn fraudulently.'

Hacking the Presidential Election: Can It Happen?

Hackers can leverage lots of technical vulnerabilities to affect election results. But a coordinated attack would be tough, due to voting systems' fragmented nature.

How to Hire an Ethical Hacker

An ethical hacker can help you find application security vulnerabilities. So how do you hire an ethical hacker?

Hackers Steal Data from Japanese Nuclear Facility

The hackers were able to siphon the data out of the facility for six months before they were discovered.

3 Cases of InfoSec Hubris That Led to Big Breaches

Hacks happen. But sometimes organizations seem to make themselves targets with behavior that is a bit too boastful, judgmental or egotistical.

World Anti-Doping Agency Breached by Russian Hackers

Confidential medical information for U.S. athletes including Simone Biles and Serena Williams was published online.

68 Million Dropbox Account Credentials Exposed

The data comes from a breach dating back to mid-2012.

52 Percent of Hackers Would Help the FBI Hack the iPhone for a Fee

And nine percent would do it for free, a recent survey found.

Tech Vendors, Law Enforcement Team to Take on Ransomware

Intel Security and Kaspersky Labs worked with international law enforcement agencies on a website that offers decryption keys for several variants of ransomware.

Using a Neural Network to Improve Social Spear Phishing

Researchers from ZeroFox build a tool that employs neural networks to trick unsuspecting Twitter users.

How to Hide Malware with a Digitally Signed Executable

Deep Instinct reveals flaw that could potentially enable a security certificate bypass in Microsoft applications.

MICROS Hackers Hit Five More POS Companies

The hackers targeted weaknesses in the vendors' servers, then attempted to steal login information and use it to access retailers' POS systems.

DARPA's Machine Challenge Solves CrackAddr Puzzle

Mike Walker, the DARPA program manager responsible for the Cyber Grand Challenge, details how autonomous systems solved a decade-old security challenge. [VIDEO]

Russian Hackers Hit Oracle's MICROS POS

It's not yet clear how many customers may be affected.

Black Hat: What Are the Tools of Car Hacking?

Time, energy and money, not a lack of tools, are keeping researchers from investigating automobile security, say Charlie Miller and Chris Valasek. [VIDEO]



3.7 Million People Affected by Massive Data Breach at Banner Health

A wide range of information was exposed, from credit card numbers to patient data.

Black Hat: Researchers Reveal PIN Pad Risks

PIN pads from multiple vendors are potentially at risk from attack, according to researchers from NCR. [VIDEO]

Hacking Hotel Keys and Point of Sale Systems at DEFCON

At DEFCON security researcher is set to reveal how magnetic stripes are at risk from exploitation.

The Black Hat Kaminsky DNS Flaw: Eight Years Later

At Black Hat 2008, security researcher Dan Kaminsky revealed flaws in DNS that he claimed could have crippled the internet. Eight years later what was the real impact?

5 Freaky but Real Application Security Threats

There are some new application security threats in town, and they are pretty scary.