Please turn on your JavaScript for this page to function normally.
Hackers breach T-Mobile Web server, leak staff data

A Web server hosting part of T-Mobile’s official website has apparently been compromised by TeaMp0isoN, a hacker collective associated with Anonymous, and some of the …

Chinese using malware to attack US DoD smart card security

AlienVault found evidence of Chinese-originated attacks against the US government agencies including the US Department of Defense (DoD), which use a new strain of the Sykipot …

How to foil targeted attacks

There are two types of targeted attacks aimed at organizations and companies: server-side and client-side. Server-side attacks consist of attacks on the organizations’ …

Israeli credit card hack creates more opportunities

In a recent data breach incident, a Saudi hacker defaced a prominent sports news web site in Israel and linked its front page to a file exposing the details of many credit …

Chinese hackers infiltrated US Chamber of Commerce

The computer systems of the US Chamber of Commerce, a lobbying group that represents the interest of US businesses and trade organizations, have been infiltrated by hackers. …

Visa probes into potential card processor security breach

Credit card company Visa has announced that it has been informed of a potential data security breach at a European payment processor and that it has mounted an investigation …

Key security threats in the coming year

The widespread adoption of mobile devices, proliferation of applications and growth of cloud computing are helping accelerate business innovation and social benefits. However, …

GlobalSign reports CA infrastructure wasn’t compromised

When the self-styled ComodoHacker – who also claimed responsibility for the DigiNotar hack – boasted that he had access to GlobalSign’s “entire …

The rise of social media abuse and mobile malware

IID released its list of the top security trends from 2011. Some specific trends that IID saw emerge over the past year include the extended enterprise coming under assault, …

12 hacking groups are behind most Chinese cyber attacks

Eastern European and Russian hackers mostly steal financial information, while Chinese ones are mainly after intellectual propriety or other sensitive data, say security …

Pros losing confidence in hard tokens

Almost a quarter of organizations, 23%, have suffered a security breach as a result of identity fraud which was linked to a lost or stolen authentication device, according to …

2012 network security trends

Looking back on 2011, FortiGuard Labs saw a number of landmark developments in the world of network security. Huge botnets such as DNS Changer and Coreflood were permanently …

Don't miss

Cybersecurity news