Please turn on your JavaScript for this page to function normally.
Adobe breached, customer info and source code compromised

Hackers have breached Adobe’s network and have made off with personal, account, and encrypted financial information of nearly 3 million Adobe customers, as well as the …

Cybercrime service providers arrested in Europe

The European Cybercrime Centre (EC3) at Europol has supported Spanish National Police in arresting two Ukrainian criminals in Madrid who sold cybercriminals access to a huge …

Icefog cyber espionage campaign exposed

Kaspersky Lab’s security research team discovered Icefog, a small yet energetic Advanced Persistent Threat (APT) group that focuses on targets in South Korea and Japan, …

Websites of energy sector companies compromised in watering hole attack

The websites of nearly a dozen energy sector companies have been compromised to serve as so-called “watering holes”, where visitors would be served with malware or …

Eight arrested over £1.3 million theft from Barclays bank

Eight men have been arrested by the Metropolitan Police’s Central e-Crime Unit (PCeU) in connection with a £1.3 million theft by a gang who stole the money by …

30 Percent of transactions conducted from Tor are fraudulent

iovation announced that 30.2 percent of transactions conducted from Tor (the onion router) in August were fraudulent. This compared with an overall fraud rate of 1 percent for …

One in ten consumers lost money to online fraud

More than one in ten consumers globally have been victims of online fraud that cost them money, according to a recent F-Secure survey which fleshed out consumer concerns about …

Medical identity theft affects 1.84 million U.S. victims

Medical identity theft is a national healthcare issue with life-threatening and hefty financial consequences. According to the 2013 Survey on Medical Identity Theft conducted …

Timing is an influential risk-factor for cyber attacks

There are several dates throughout the year that are notorious for wreaking havoc on businesses via DDoS attacks, data breaches and even malware or botnet assaults. According …

Placing the Suspect Behind the Keyboard

There are many books addressing the subject of computer forensics out there, but this tome is one of the rare ones that approaches cybercrime investigations in a holistic …

Most security managers don’t trust their apps

Application vulnerabilities are a major factor in the cybercrime game. More than 500 CISOs and Security managers have been interviewed by Quotium about the security state of …

Hacker admits to selling access to company networks, supercomputers

A Pennsylvania man pleaded guilty today to charges stemming from his participation in a scheme to hack into computer networks and sell access to those networks. Andrew James …

Don't miss

Cybersecurity news