Organizations continue to face the ongoing challenges of securing a continually evolving network perimeter. Organized crime has shifted to the digital underworld.
Jacob Mahonri Espinal hacked into his school's computer system to bring his grades up from academic probation status to straight As.
Two telemarketing operations conned thousands of customers by tricking them into buying into tech support services for computer problems that didn't exist.
Nicolae Popescu and Dumitru Daniel Bosogioiu are wanted for organizing an international crime scheme that led to millions of lost dollars.
Israeli police arrested eight former Leumi employees in a scheme to extort millions of shekels.
Cameron Harrison, 28, posessed more than 260 compromised credit and debit card numbers at the time of his arrest and is one of 55 people facing charges pertaining to their association with "Carder.su."
Arturas Samoilovas allegedly illegally accessed the computer network of Eaton Corporation and installed malware after he was denied a position at the company.
The anonymity software's moderators aren't entirely sure how up to 50 illicit websites were discovered and shut down this past week.
One-time passwords (OTPs) sent via SMS are increasingly the target of Android malware, the report by Javelin revealed.
A college student showing off his technical prowess hacked into websites of malls, hospitals and universities.
Seventeen suspected members of online marketplaces, including Silk Road 2.0's alleged operator, have been arrested.
After months of looking for him, Baden was nabbed in Tijuana when tips began coming in about his whereabouts.
Fredrik Neij was arrested at the Thai-Laos border earlier this week on copyright violation charges.
Vladimir Drinkman, who was charged for his involvement in the Heartland breach, is currently in the Netherlands.
Scott Walton served as a lead member of the SnappzMarket Group, which conspired to illegally reproduce and distribute more than one million copyrighted Android apps.
Industry experts debate whether organizations should or should not pay a cyber ransom to miscreants.
Tracking down threat actors is no easy feat, and requires an immense amount of research and collaboration.
Researchers at Trend Micro found that attackers were targeting Simple Mail Transfer Protocol (SMTP) servers to execute malicious code and an IRC bot.
Gottfrid Svartholm Warg was found guilty of hacking an IT service provider in Denmark. This is his second court case for illegally accessing data.
Christian Lacroix, who famously hacked Paris Hilton's phone and Burger King's Twitter account was sentenced for breaking into Bristol Community College computers.
An Estonian man, Sergei Tsurikov, was sentenced Friday after helping to steal over $9.4 million from payment processor RBS WorldPay in 2008.
Nicholas Rotundo was taken into custody by federal agents for blackmailing a female college student by threatening to post her nude images on a revenge porn website.
A federal court shut down Pairsys at the request of the Federal Trade Commission.
Aleksi Kolarov was a vendor on Shadowcrew.com, an online cybercrime marketplace that sold stolen credit and bank cards and caused millions of dollars in damages.
Speaking at a National Association of State Attorneys General conference, ISA's Larry Clinton asked the AGs to step up efforts to get more resources.
Kristin Nyunt of Monterey, Calif., is charged with two counts of illegal wiretapping and possession of illegal interception devices and faces a sentence of up to five years in prison.
Fraud managers have the thorny task of safeguarding their organizations and its customers against fraudsters. New best practices in online fraud detection (OFD) have emerged that advocate a "five layer model."
David Barnhouse was sentenced to 18 months in prison after he hacked into a neighbor's Verizon FiOS router to post a bomb threat on a Pennsylvania mall's website.
Lamar Taylor was sentenced in New Jersey this past week for allegedly participating in a cybercrime scheme that accounted for more than $15 million.
A report details the three most commonly exploited Java bugs affecting users.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context