Sony Pictures recently canceled the "The Interview" movie release, following hacker threats.
OphionLocker doesn't diverge much from previous ransomware schemes, although it does generate a unique hardware ID based on the first hard drive's serial number, the motherboard's serial number and other information.
Witnesses against Ross Ulbricht are being kept under wraps after New York district court judge Katherine Forrest determined their safety could be at-risk.
Several were arrested in Operation Torpedo, including former acting HHS cyber director DeFoggi.
A report from DellSecureWorks Counter Threat Unit revealed hacker training tutorials, replacement guarantees and a drop in RAT prices.
Sony Pictures's attorney David Boies is demanding that news outlets destroy "stolen information" involved in the leaks.
Sean Nolan McDonough, also known as 'Narko,' pleaded guiltycomputer misuse and money laundering in connection to the massive denial-of-service attack (DDoS) on SpamHaus and Cloudflare.
Eric Omuro, who also goes by "Red," ran the site myRedBook.com.
Symantec tracked the price of stolen goods and malicious services, as well as black market price fluctuations over the years.
Cybercriminals often target those areas of a network that pose the least resistance to get what they're after - usually the personally identifiable information of customers and employees, trade secrets, intellectual property and still other critical data.
Local police seized servers, computers and additional equipment in the raid that took place in greater Stockholm and The Pirate Bay is still offline.
In an email sent to Sony Pictures' CEO and co-chairman hackers requested "monetary compensation."
In this video, Tom Kellermann, chief cybersecurity officer at Trend Micro, discusses trending cybercriminal tactics in 2014, such as Island Hopping.
Mohammad Azhar Tahir used a XSS attack to hack into and deface the prime minister's website.
Organizations continue to face the ongoing challenges of securing a continually evolving network perimeter. Organized crime has shifted to the digital underworld.
Cyber threat investigators discuss privileged account vulnerabilities found in most serious security breaches.
Police responding to a fire at an estate in Nairobi found a sophisticated cyber command center likely to be used for cyber attacks in Kenya.
Noe Iniguez posted a nude photo and derogatory remarks about his ex-girlfriend on her employer's Facebook page.
The international crackdown effort, led by Europol, included the help of airlines and credit card companies.
A California man was sentenced to 18 months in prison for remotely accessing POS machines that he sold to Subway restaurant franchises, and loading up at least $40,000 onto gift cards.
Police nabbed five suspects in a series of raids, all for being suspected of using Remote Access Trojans to compromise computers.
Jacob Mahonri Espinal hacked into his school's computer system to bring his grades up from academic probation status to straight As.
Two telemarketing operations conned thousands of customers by tricking them into buying into tech support services for computer problems that didn't exist.
Nicolae Popescu and Dumitru Daniel Bosogioiu are wanted for organizing an international crime scheme that led to millions of lost dollars.
Israeli police arrested eight former Leumi employees in a scheme to extort millions of shekels.
Cameron Harrison, 28, posessed more than 260 compromised credit and debit card numbers at the time of his arrest and is one of 55 people facing charges pertaining to their association with "Carder.su."
Arturas Samoilovas allegedly illegally accessed the computer network of Eaton Corporation and installed malware after he was denied a position at the company.
The anonymity software's moderators aren't entirely sure how up to 50 illicit websites were discovered and shut down this past week.
One-time passwords (OTPs) sent via SMS are increasingly the target of Android malware, the report by Javelin revealed.
A college student showing off his technical prowess hacked into websites of malls, hospitals and universities.
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- House, in rush vote, passes Intelligence Authorization Act
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- U.S. accounts for most Mac OS X attacks and websites seeded with malware
- Audit shows University of Maryland security flaws remain
- White House calls Sony hack a "serious national security matter," gov't mulls proper response
- 'Spark' shares traits with Alina, JackPOS, uses AutoIt differently
- California nonprofit sues San Diego Police Department over stingray documents
- Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk
- Securing the enterprise with the five W's of access