Trendon T. Shavers pocketed more than $101 million after convincing Bitcoin owners to invest in his phony firm.
The center will help enterprises avoid costly disruptions caused by cyber incidents and natural disaster.
The mobile operating system, Android L, is expected to be released later this year.
The privacy group said the response to the Challenge exceeded its projections threefold.
The New York Times reported that the retailer's security team warned of possible system vulnerabilities but managers never followed through.
Another wave of celebrity nude photos were released Saturday and sites like 4chan moved quickly to remove them.
Insurance firm Beazley analyzed more than 1,500 data breaches it serviced between 2013 and 2014.
The company received more than 100,000 government requests for customer data last year.
A Milwaukee Journal Sentinel investigation found customer payment card information from all 26 Wisconsin stores on sale.
The recently discovered campaign is using The Times of Israel and The Jerusalem Post to expose users to the Zemot Trojan.
Two men were arrested for stealing money from victims' bank accounts after sending malicious emails offering a romantic gift.
Victims had been able to restore encrypted files without paying a ransom.
Home Depot confirmed that approximately 56 million payment cards may have been compromised as result of a malware attack.
Due to the flaw, iPhone bidders were vulnerable to being redirected to a phishing page.
The new operating system protects the device's personal information with a passcode that Apple will not be able to bypass.
K Box was targeted in an attack that was supposed to express unhappiness over a toll fare hike.
Trend Micro noted several differences between Critolock and CryptoLocker, however.
The company followed through on its promise to up iCloud security by implementing two-factor authentication earlier this week.
A web hosting service apologized for intermittent unauthorized access of its hosted environment over 18 months that led to the Goodwill breach.
The Reader and Acrobat fixes were delayed a week due to issues found during testing.
The suspect, Godswill Oyegwa Uyoyou, conspired with others to hack bank systems and divert 6.28 billion Naira to mule accounts.
The top Democrat on the House Oversight and Government Reform Committee asked for a hearing to investigate the CHS breach.
Google indicated in its most recent transparency report that it also saw a 15 percent jump in government requests for user data since the end of last year.
A security expert discovered a vulnerability in Amazon's Kindle Library that could lead to cross-site scripting attacks and account compromises.
This summer's attack on the bank's network might have helped hackers detect subtle vulnerabilities they could exploit in the future.
Copies of controversial surveillance software, called "FinFisher," were made available for public scrutiny by WikiLeaks.
Nuix believes the malware found on Home Depot's systems belongs to a different threat family.
Documents provided by Edward Snowden reveal that the NSA is looking to build a near real-time map of every single internet-connected device in the world.
Dropbox issued its transparency report that shares the company had received 268 government requests for users' information, and in some cases, account files.
The Federal Bureau of Investigation has announced that it is prepared to roll out its new fully operational facial recognition system.
In testimony to a Senate committee, cyber experts said the U.S. has fielded 600,000 attacks this year.
The app is expected to be launched next year.
The unencrypted desktop computer was stolen from a university physician's office in July.
In a survey of more than 1,000 Americans, 35 percent of respondents said that they improved security following the celebrity photo hacking incident.
Federal officials compelled American tech companies to participate in the NSA's PRISM program or face huge fines.
A computer dealer in Canada said that a server he bought contained the firm's client data and he is asking for payment to delete it.
The Burlington, Vt.-based web and mobile application security firm announced that it closed on $40 million in a late-stage funding round.
The Retail Industry Leaders Association announced the appointment of Nicholas Ahrens as the new head of cybersecurity for the trade group.
The 22-year-old man, Lewys Martin, pleaded guilty in London last week.
An Illinois resident sued the home improvement retailer and claimed the company failed to comply with security standards.
Unauthorized payment card purchases made in Massachusetts, New York and Texas may be tied to four Beef 'O' Brady's sports bar locations in Florida.
Experts have discovered a phishing campaign that targets users with a phony PDF attachment that leads to the vawtrak malware.
The "Cybersecurity: Protecting the Payments Systems" summit will encourage coordination between all cybersecurity and industry entities.
Adobe has issued security fixes addressing 12 vulnerabilities affecting its Flash Player and AIR for Windows, Macintosh and Linux platforms.
In a letter to the FTC chairwoman, Sen. Markey and Sen. Blumenthal urged the agency to use its authority if Home Depot had failed to protect consumer data.
A new phishing campaign popped up last week and lures victims into handing over their Apple ID login credentials.
On Monday, the University of New Haven revealed its first video in a series of security findings.
After nearly a weeklong investigation, Home Depot confirmed on Monday that its payment data systems have been breached.
Administrator Marilyn Tavenner will have to testify in front of the House Committee on Oversight and Government Reform on Sept. 18.
More than 40 civil liberties groups are urging Senate leaders to pass legislation that would put a halt to the NSA's data collection practices.
Customers of New Zealand communications service provider Spark experienced internet connectivity issues over the weekend due to a distributed denial-of-service attack.
Fortinet and Palo Alto Networks founded the alliance in May, and McAfee and Symantec are the first companies to join.
Security experts have discovered a social engineering ruse that installs a malicious Google Chrome extension to lure victims in a click fraud campaign.
Apple's CEO said the company will begin using email and push notifications to alert users to passwords changes in any iCloud account.
The FTC said Google must refund parents whose children made in-app purchases without their permission.
Late last month a group of attackers targeted the web hosting company's login portal to try and access users' accounts.
A server used to test new code was hacked in July to drop malware intended for DDoS attacks.
High-Tech Bridge discovered two SQL injection vulnerabilities in All In One WordPress Security and Firewall plugin and notified the vendor.
More than 750 healthcare organizations will test their cyber attack responses in October as part of a HITRUST initiative.
The social media giant recently announced its new bug bounty program, rewarding researchers that find security vulnerabilities in its web services.
The third annual Mobile Pwn2Own competition will feature new devices to crack and a $425,000 prize pool, which has gone up $125,000 from last year's.
ACLU is currently arguing its case against NSA's spying program before the U.S. Circuit Court of Appeals.
Research from Bidefender found that Home Depot's payment interface could have a vulnerability that would allow attackers into the company's systems.
DDoS attacks on Silk Road 2.0 and a hack at the Pandora Openmarket have paved the way for Agora to become largest Darknet marketplace.
Researchers with Kaspersky Lab were able to sinkhole two command-and-control servers used by certain Backoff point-of-sale malware samples.
A judge has lifted a suspension of a previous order compelling Microsoft to hand over customer emails stored on a server in Ireland.
Trend Micro first alerted the public to the backdoor affecting Netis and Netcore brand routers.
The group will bring countries together to address major cyber security threats, including malware and botnets.
The group's Center for Secure Design released a report detailing how to avoid common design flaws.
Under the agency's COPPA ruling, website that collect personal information on its young users must receive parental consent before doing so.
A variant of the BIFROSE backdoor which is more evasive than its predecessor has been discovered by experts.
Under its new protocol, app developers are prohibited from selling users' personal health information.
During a migration of the testing server for test builds of Bugzilla software, data on about 97,000 Bugzilla users was inadvertently posted publicly online.
Although Lizhong Fan left the U.S. in 2007, the agencies responsible for giving him access to Americans' personal information have yet to disclose the details of the case to the public.
Researchers at Kaspersky Labs analyzed the evolution, slight as it might be, of the NetTraveler toolkit.
The MS14-045 update caused some users' systems to crash, and in response, Microsoft pulled the update.
The warning comes soon after the Secret Service and DHS issues a warning on the threat.
The website of Racing Post was hit by a SQL injection attack in October 2013, enabling an attacker to access a database including information on 677,335 customers.
The study by KPMG and FireEye also found that 49 percent of detected malware was unknown.
The bill would prevent companies from selling students' data and profiting from it.
The suit claims the hospital operator failed to meet security standards to protect the personal information belonging to patients.
More than 300 companies are being warned to check their systems after at least 50 oil companies confirmed that their systems were attacked.
Several financial institutions are reporting payment card fraud activity on credit and debit cards used at various Dairy Queen stores around the country, according to Brian Krebs.
Two nude models' photos reeled in unsuspecting victims who handed over their Facebook logins to gain access to adult material.
James Raj Arokiasamy, known as "The Messiah," now faces a total of 162 charges stemming from a string of attacks he conducted.
More than 1,000 analysts at 23 U.S. government agencies have had access to more than 850 billion records courtesy of NSA's ICREACH, a search engine similar to Google.
A patent that has recently been granted to Twitter reveals how the social media giant plans to block mobile malware from affecting its users.
The routers are sold in China under the Netcore brand name, and elsewhere as Netis products.
Starting July 2015, all smartphones sold in the state must come with the anti-theft technology.
Claiming funding from the federal government and an endorsement by President Obama, a debt relief program coerced private data from consumers.
A researcher at Fortinet has revealed more details about iOS/AdThief, which hijacks revenue through jailbroken iPads and iPhones.
Anonymous confessions posted on a popular app, called "Secret," were susceptible to being exposed via a hack.
The personal information of up to 25,000 government workers may be at risk after U.S. Investigations Services (USIS) was breached.
Up to seventy percent of the population aged between 15 and 65 might have had their names, resident registration numbers, account usernames and passwords stolen.
The Metropolitan Police have reportedly lobbied for two years to enact the standard.
The man accused of creating Silk Road - a black market existing on the Deep Web and accessible through the Tor network - is facing new charges from federal prosecutors.
A spam campaign involving the Carbon Grabber crimeware kit is ongoing against the automotive industry in Europe, according to Symantec.
A piece of ransomware known as ZeroLocker contains various errors that may prevent files from being decrypted even if the ransom is paid.
Although the number of rogue anti-virus malware campaigns have decreased overall, the threat isn't totally gone, according to researchers at Microsoft.
GMR Transcription Services in California agreed to settle FTC charges related to its security practices.