Following a series of high-profile Twitter account hijacks, the microblogging service finally has delivered two-factor authentication.
The IE exploit was most recently used in watering hole attacks directed at the U.S. Department of Labor website.
Attackers who raided Google in 2010 to learn information about Chinese human rights activists were also trying to gain insight on which Chinese intelligence agents were on the radar of U.S. authorities, according to a report.
While a major attack has yet to take place on the U.S. energy sector, now is the right time for these critical infrastructure providers to ready their defenses.
The sensitive information, including names, addresses, and Social Security numbers, went missing from a third-party vendor's warehouse.
The U.S. government is sending a clear message: We won't tolerate secrets coming to light.
This infographic created by TrendMicro, gives insight into how cyber criminals are improving in ways to steal money. Click here for the full infographic.