Hackers 

ESEA Hacker Demands $100,000, Exposes 1.5 Million User Records

The hacker provided the records to LeakedSource after ESEA refused to pay the ransom.

Topps Data Breach Exposes Months of Credit Card Data

Customers who shopped at the company's website between July 30 and October 12 of 2016 may be affected.

Chinese Hackers Charged with Breaching U.S. Law Firms, Trading on Stolen Information

The hackers are alleged to have made over $4 million in illegal profits from the trades.

Researchers Find Russian Hacker Selling Access to U.S. Election Assistance Commission

The hacker claimed to be accessing the system via an unpatched SQL injection vulnerability.

4 Ways to Upgrade Your Threat Sharing

Top InfoSec brass spoke at the 2016 Advanced Cyber Security Center conference on the importance of collaborative threat sharing.

Hackers Steal Trade Secrets in 'Massive Cyber Attack' on German Manufacturer

The company said the attack involved 'organized, highly professional hacker activities.'

Hackers Expose Info on 87 Million Dailymotion User Accounts

In 18.3 million cases, the exposed data includes hashed passwords.

900,000 Deutsche Telekom Routers Disabled by Massive Cyber Attack

The routers were 'affected by an attack from outside,' the company said.

Hackers Hit Madison Square Garden, Radio City Music Hall, Beacon Theater, Chicago Theater, Michigan State University

The data potentially accessed ranges from students' names and Social Security numbers to credit card numbers and expiration dates.

Hack the Army - and Get Paid for It

The U.S Army is the next branch of the Department of Defence to embrace the bug bounty bounty model in an effort to improve security.

40,000 Tesco Bank Accounts Accessed by Cyber Thieves

In 20,000 cases, the bank says, the breaches resulted in 'money being withdrawn fraudulently.'

Hacking the Presidential Election: Can It Happen?

Hackers can leverage lots of technical vulnerabilities to affect election results. But a coordinated attack would be tough, due to voting systems' fragmented nature.

How to Hire an Ethical Hacker

An ethical hacker can help you find application security vulnerabilities. So how do you hire an ethical hacker?

Hackers Steal Data from Japanese Nuclear Facility

The hackers were able to siphon the data out of the facility for six months before they were discovered.

3 Cases of InfoSec Hubris That Led to Big Breaches

Hacks happen. But sometimes organizations seem to make themselves targets with behavior that is a bit too boastful, judgmental or egotistical.

World Anti-Doping Agency Breached by Russian Hackers

Confidential medical information for U.S. athletes including Simone Biles and Serena Williams was published online.

68 Million Dropbox Account Credentials Exposed

The data comes from a breach dating back to mid-2012.

52 Percent of Hackers Would Help the FBI Hack the iPhone for a Fee

And nine percent would do it for free, a recent survey found.

Tech Vendors, Law Enforcement Team to Take on Ransomware

Intel Security and Kaspersky Labs worked with international law enforcement agencies on a website that offers decryption keys for several variants of ransomware.

Using a Neural Network to Improve Social Spear Phishing

Researchers from ZeroFox build a tool that employs neural networks to trick unsuspecting Twitter users.

How to Hide Malware with a Digitally Signed Executable

Deep Instinct reveals flaw that could potentially enable a security certificate bypass in Microsoft applications.

MICROS Hackers Hit Five More POS Companies

The hackers targeted weaknesses in the vendors' servers, then attempted to steal login information and use it to access retailers' POS systems.

DARPA's Machine Challenge Solves CrackAddr Puzzle

Mike Walker, the DARPA program manager responsible for the Cyber Grand Challenge, details how autonomous systems solved a decade-old security challenge. [VIDEO]

Russian Hackers Hit Oracle's MICROS POS

It's not yet clear how many customers may be affected.

Black Hat: What Are the Tools of Car Hacking?

Time, energy and money, not a lack of tools, are keeping researchers from investigating automobile security, say Charlie Miller and Chris Valasek. [VIDEO]