Cybercrime News, Articles and Updates
Cable provider Cable One alerted its customers of a phishing email scam looking to steal payment and personal information.
An unencrypted database was discovered containing 154 million records of U.S. voters, including addresses, phone numbers, political party, income range, ethnicity, age, and voting history.
Law enforcement officials in Knox County, Ill. earlier this week arrested a longtime IT employee of Abingdon-Avon School District #276 on electronic eavesdropping charges in connection with a recent data breach, according to local reports.
PandaLabs was able to work around the password to access the server controlling PunkeyPOS without credentials because the bad guys didn't properly configure it, the researchers said.
Carbonite announced a forced password reset after the online backup provider discovered attackers attempting to access its user accounts.
Unidentified individuals hacked into the loyalty program of at least 20 accounts at Air India to steal nearly $24,000 worth of frequent flier miles.
Patches have been made available for programming errors found in libarchive that could make software used in a number of platforms vulnerable to exploitation.
Conficker maintains its rank as the most common malware family, according to Check Point's May 2016 Threat Index.
Ethereum, a rival to bitcoin, is under seige after follow-up attacks continue to siphon funds based in the cryptocurrency.
Annapolis, Maryland officials spotted malware on parking garage servers which may have compromised customer payment information.
An amendment to the "Commerce, Justice, Science and Related Agencies Appropriations Act," which would expand the FBI's NSL authority failed to pass the Senate Wednesday.
Security researchers discovered a new family of malware sold as a banking-Trojan-as-a-service. The cybercriminal rents the banking Trojan for about $600 per 10-day period.
A recently discovered mobile malware program is giving Android devices a mind of their own, causing them to use Google Talk to secretly and repeatedly place outgoing calls to mysterious phone numbers approximately every two minutes.
The Vermont Fish & Wildlife Department reported that customer data may have been compromised on two separate occasions.
Assistant AG Leslie Caldwell said amendments to Rule 41 don't run counter to the Fourth Amendment, while the EFF and other groups mobilized web operators and citizens to oppose the changes set to take affect December 16.
Kaspersky Lab researchers obtained evidence suggesting the xDedic underground marketplace may have been larger than previously thought.
The U.S. military may not be doing enough to protect its weapons systems from cyberattacks, former National Security Council (NSC) Cybersecurity Director Richard Clarke said during a recent conference.
Hackers used login information to launch a "sophisticated password attack" to login to Citrix's GoToMyPC user accounts, according to a company blog post.
Customers are at risk of marketers using the data to approach them with unsolicited offers.
Reporters Without Borders (RSF) has asked French senators to bolster the Sapin 2 bill's protections and address its flaws.
GitHub reported on June 14 someone launched a campaign to access several GitHub.com accounts using stolen login credentials.
Multi-Color, a label solutions firm, reported that a break-in at a third party affiliate resulted in the compromise of employee personally identifiable information.
A probe into the cybertheft of $81 million from the account of Bangladesh Bank held at the Federal Reserve Bank of New York is now under way by the U.S. attorney's office.
Following the shuttering of the Necurs botnet, security researchers noticed a subsequent drop in Angler exploit kits and other malware campaigns.
Researchers discover a hacker marketplace on the Dark Web selling access to more than 70,000 hacked computer servers.
Developers behind the Nemucod downloader are working diligently to avoid detection.
As ransomware grows in popularity, TrendMicro researchers examined some of the tactics and techniques beyond encryption that enable the file locking malware to work.
In a first of its kind case, an ISIS-linked hacker pleaded guilty to providing material support to a designated foreign terrorist organization.
An engineer is facing economic espionage charges after attempting to sell proprietary source code stolen from his former employer.
Users of PayPal are being targeted in a new phishing scheme that steals their credentials.
SC Magazine Articles
- Blasphemy! Godless malware preys on nearly 90 percent of Android devices
- 'Password attacks' continue; Citrix becomes latest victim
- Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows
- Acer breach caused by improperly stored data
- Check Point tracks two waves of Cerber ransomware hitting U.S., UK
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components