Authorities in South Korea have arrested a total of 16 individuals suspected of abusing the personal details of millions of people to earn large...
Hi, what are you looking for?
Authorities in South Korea have arrested a total of 16 individuals suspected of abusing the personal details of millions of people to earn large...
As organizations worldwide become more and more aware of the risks posed by the lack of protection against cyber threats, information security spending will...
After being notified by researchers at Sucuri, the developers of the Akeeba backup extension for Joomla fixed a vulnerability that can be leveraged to...
Small and medium companies in the European automobile sector have been targeted by cybercriminals using a relatively new piece of malware, according to a...
Sony on Sunday said that some of its online services were hit by a DDoS attack by a hacker group, while another group threatened...
A group of hackers presumably located in China managed to breach Community Health Systems, one of the largest hospital operators in the United States,...
Spam is highly problematic on Twitter, which is why the social media network has developed a system that helps its efforts to keep users'...
Researchers at Trend Micro have uncovered a security hole that can be exploited to launch phishing attacks against users who make payments from their...
Researchers at the University of Michigan and the University of California, Riverside have developed a new attack method that can be used to obtain...
Technology mergers and acquisitions (M&A) soared by 57% year-over-year in the second quarter of 2014 and IT security has played an important role in...
The National Institute of Standards and Technology (NIST) released today draft guidelines for addressing the security risks posed by the use of Secure Shell...
A recent study conducted by iSEC Partners provided the developers of the Tor Browser Bundle with several long and short-term recommendations on how to...