A Las Vegas court convicted a cybercriminal under RICO (Racketeering Influenced Corrupt Organizations Act) law last week, in what may well turn out to be a landmark case.
How many sex toys, exactly, does it take to fight what the hackers see as corruption? TeamBerserk is reportedly up to 18.
The Boston Convention & Exhibition Center denies the security breach happened inside its building, while many convention-goers said they used their credit cards at shops, hotels and restaurants in the Seaport area of the city.
A 27-year-old man based in San Diego, California, faces prison after being charged with 31 felonies related to the publication of 10,000 explicit photographs sent in by the victims' ex-partners.
All those complicated passwords just slow you down when all you really want to do is blast the smithereens out of something fast.
Last Thursday Twitter introduced promoted tweets (ads) targeted according to the websites you've visited. It seemed like a good time to explain how Twitter is doing it, how they've used a different technique to track the websites you visit for some time now, and how to turn it all off if you want to.
Our latest Security Threat Report is out!
It's a free download (no registration required), and we think you're going to love it, because it paints a fascinating picture of the evolving threat from cybercrime...
A 38-year-old man from the US state of Wisconsin has been sentenced to two years of federal probation and will pay a $183,000 fine for taking part in a distributed denial of service (DDoS) attack organized under the Anonymous hacktivist brand.
The updates for Microsoft's December 2013 Patch Tuesday are out.
Paul Ducklin takes a brief look at what's in, and what's not.
Agency spies snooped on online gaming worlds, including World of Warcraft, Second Life and Xbox Live
The games were so overrun with spies as of 2008, the intelligence outfits mulled a "deconfliction" group so they wouldn't collide into each other.
Everyone we do business with, share data with, outsource operations to, sell things to or buy things from forms a part of our own security chain. A breach at any point in the chain can have an impact on the privacy and integrity of our data.
Without going into detail, US President Barack Obama has said that he'll propose "some self-restraint" to the National Security Agency (NSA) in order to rein in rampant snooping.
Microsoft says it's fast-tracking the encryption of consumer data and moving toward greater source-code transparency. It sounds good on paper, though there are those who question why Skype, for one, was left off the list and how in the world we can trust a for-profit software maker.
Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.
This month really is an omnibus update: all platforms are affected, from XP to 8.1 and from Server 2003 to 2012, including stripped-down Server Core installs.
It looks as though the NDPROXY.SYS kernel bug in XP might be fixed, but, then again, it might not...
A torch that needs to know where you are? What on earth for? So it can adapt the intensity of the light to your latitude?
Of course not! The data was mined and sold to advertisers...
A UK policeman arrested in connection with internet troll abuse against Nicola Brookes that's dragged on over two years has been disciplined with the most severe punishment possible from a "Misconduct Meeting" he attended on Tuesday: namely, a warning. Meanwhile, documents point to PC Rimell having "reconditioned" his PC—read "wiped his hard drive"—a few weeks before investigators showed up looking for evidence.