While most Americans enjoyed a long holiday weekend, researchers in the security community were working around the clock to unravel the mysteries of one of the most intimid...
As security breaches continue to grow both in frequency and in the amount of damage they cause (according to Symantec, the average organization incurred $470,00...
According to Symantec's annual Internet Security Threat Report, religious and ideological Web sites have far more security threats per infected site than adult/pornographic Web sites.
"We hypot...
Members of Anonymous and the Peoples Liberation Front (PLF) recently announced the launch of the AnonPaste service for the uploading and sharing of data."Paste services hav...
According to an FBI affadavit, alleged CabinCr3w hacker Higinio O. Ochoa III was caught by FBI agents after posting a photo of his girlfriend online."Higino O. Ochoa III was charged with illegally h...
Nude photos of "Glee" star Heather Morris were recently posted online."The naked pictures are alleged to have been stolen by hackers from the 25-year-old actress's mobile p...
The porn site Digital Playground was recently hacked by The Consortium, exposing 72,794 customers' user names, e-mail addresses and passwords, as well as more than 44,000 cr...
A new botnet coded by TheGrimReap3r is currently nearing completion, and will soon be offered for sale on hacking forums for $8,000."THOR does not use a central ," Infosecuri...
In the earlier days of computers, virus writers and hackers were viewed as fame-seeking and adrenaline-hungry teens with nothing better to do. But as PC usage and the Internet grew, th...
The cornerstone of any reliable security system is authentication, the way of confirming the truth of something or the identity of a person. To protect data and/or control ...