Guest Post When you lose your personal cell phone, does your employer have the right to remotely wipe all your data?
Where there is political discord, there is Anonymous. The hacktivist group attacked Israeli websites last night after the Israeli Defense Forces began live blogging and tweeting its attack on Hamas rocket zones in Gaza.
Guest Post Here's how to avoid being one of the 1.5 million people that fall victim to cybercrime every day.
An Egyptian hacker claims to have broken into Adobe's systems today, posting data for 150,000 people's accounts. The reason? The hacker wants Adobe to pay more attention to reported vulnerabilities.
President Obama signed a new cyber security directive in mid-October, according to The Washington Post, that begins to outline the government's involvement in securing the private sector, and how it will act when on the offensive.
Skype has plugged a hole in its password recovery process that allowed outsiders to gain control of a Skype user's account.
Once upon a time, you knew who to fire when a hack took down your servers: The "little weenies" running around in the basement of your company, as AlienVault's Russell Spitler put it. But that's all changing.
"Government surveillance is on the rise," Google said after it released its sixth transparency report today. The company releases the bi-annual reports in order to keep governments accountable as Internet companies receive more and more requests to hand over or remove content.
Editor's Pick Def Con, the famed hacker conference, just celebrated its 20th birthday this year. And to mark the occasion, the conference welcomed something they strictly policed in years prior: a film crew.
We've finalized the list of speakers for CloudBeat 2012, which includes CTOs and CIOs from top enterprise customers as well as the cloud companies competing for their business. You won't want to miss it.
Following legitimate hacks into some Twitter accounts, the site ended up mistakenly sending password reset e-mails to a large number of unaffected users as well.
Several NBC websites were briefly hacked today by a hacker trying to make a very original Guy Fawkes Day reference.
EMC Corporation, a multinational oldster in big data and cloud storage, has just agreed to buy Silver Tail Systems, a startup that uses real-time predictive analytics to detect and prevent online fraud and crime.
Dabble in online dating? It turns out that the crippling fear of an awkward first date is the least of your troubles. A fraud is sweeping online dating sites, according to a special report in this month's issue of Glamour Magazine.
If you have Lookout Mobile on your iPhone or iPad -- a security app that, among other things, helps you locate your device when it's lost -- you can now find your phone even if the battery's dead through a feature called Signal Flare.
If you looked at a graph of denial of service attacks, you'd likely see a hockey stick of growth in 2011, according to research by DDOS-protection company Prolexic.
Guest Post During the Presidential election season, scammers can’t wait to cast their nets. It’s important to know the signs of fraud and be able to identify the difference between a legitimate email from a fraudulent one. Here are three ways to identify a potentially counterfeit email or website.
A Bulgarian digital rights activist is the proud owner of your Facebook name, username, and email today. Bogomil Shopov bought this information for 1.1 million Facebook users for $5.
Hackers stole credit card information and potentially tax information from 3.6 million people in South Carolina. They obtained the data by hacking into the state's Department of Revenue -- a hole which the DOR says it has patched up.
Hackers compromised credit card readers at 63 Barnes & Noble stores, according to the company. The bookseller is urging customers to check their bank statements for fraudulent activity and to change their ATM pins.