Three LulzSec members plead guilty in London

Ryan Ackroyd, 26; Jake Davis, 20; and Mustafa al-Bassam, 18, who was not named until now because of his age, all admitted their involvement in the hacktivist gang's attack spree.

Microsoft fixes three "critical" flaws with Patch Tuesday release

The biggies are two vulnerabilities in Internet Explorer and a single weakness in Remote Desktop Connection.

White House says new Chinese IT equipment rule may disrupt business without helping security

White House says new Chinese IT equipment rule may disrupt business without helping security

Several U.S. trade groups also have objected to the provision, part of a recently passed appropriations bill, which bars certain federal agencies from buying IT tech gear produced by Chinese government-related companies.

Court says Hannaford breach lawsuit doesn't meet standards of class-action

Plaintiffs' failure to have an expert verify their damages was a "fatal" flaw in the case, according to a federal judge.

Judge says lawsuit against comScore can proceed as class action

The web measurement company is accused of secretly collecting data on millions and then sharing it with clients.

Roughly 20 charged in Eastern Europe with building Carberp banking trojan

Law enforcement in Russian and Ukraine have dealt a major blow to a prolific banking malware operation.

"Right to Know" bill proposes more transparency for California data collectors

"Right to Know" bill proposes more transparency for California data collectors

The state, no stranger to pioneering data security and privacy legislation, is at it again with a proposed measure that would force companies to be transparent about with whom they are sharing customer information.

April's Patch Tuesday from Microsoft includes another Internet Explorer patch

April's Patch Tuesday from Microsoft includes another Internet Explorer patch

The software giant expects to distribute eight other fixes to correct vulnerabilities in Windows, Office, Server Software and Security Software.

Malware tries to invade technology companies once every 60 seconds

Malware tries to invade technology companies once every 60 seconds

No matter the industry, organizations are facing a flurry of sophisticated attacks, with the main goal being to hijack intellectual property, according to new findings from security firm FireEye.

Sophos' flagship web security product open to attack

The security company is urging customers to upgrade to the latest version of the appliance, which is not susceptible to the vulnerabilities reported Wednesday by researchers at SEC Consult.

Android malware targeting Tibetans has state-sponsored fingerprints

New clues turned up by researchers at the University of Toronto show that an Android malware spy campaign appears to be the work of Chinese hackers, possibly with the assistance of the nation's government or a major corporation.

Public safety personnel targeted by DoS attacks flooding phone lines

Fraudsters pretending to be from collections companies are seeking to recover non-existent loans. If victims don't pay up, their administrative call centers are hit by telephone denial-of-service attacks. 9-1-1 lines weren't targeted.

Market for DDoS prevention to hit $870 million

Despite being an age-old problem, recent DoS and DDoS attacks are driving huge growth for mitigation solutions.

China unhappy with new U.S. requirement that its IT gear must face review

The rule, part of a general appropriations bill signed by President Obama last week, comes following growing evidence of China's organized cyber espionage operations.

Company news: dinCloud's new CTO, and Bluebox Security's new research team

This month's company news features new additions to the dinCloud, Tripwire, and Crocus Technology, as well as Bluebox Security's new research team that will analyze mobile security threats.

News briefs: Mandiant uncovers espionage, Evernote is breached, and more

News briefs: Mandiant uncovers espionage, Evernote is breached, and more

This month's news briefs includes recent news on Mandiant uncovering China's cyber espionage efforts, security firm Bit9's breach, and the Obama administrations latest efforts on combating the theft of trade secrets.

Federal judge to weigh in on FBI's "stingray" cell phone surveillance

In a matter of weeks, an Arizona federal judge is expected to decide whether the FBI illegally caught an accused fraudster.

Web-based malware threats primary challenge for industry pros, survey says

Of the companies polled in a recent survey, eight in 10 indicated that they experienced web attacks in 2012.

Anonymous takedown of Koch sites leads to indictment of Wisconsin man

Eric Rosol, 37, of Wisconsin was indicted Tuesday by a grand jury.

New U.S. law says government agencies will need OK before buying Chinese IT equipment

According to the legislation, the review process will quell cyber espionage threats from China.

New study finds malware variants skirting AV, mostly delivered via web

New study finds malware variants skirting AV, mostly delivered via web

As the debate on the usefulness of anti-virus continues, recent research reveals that a majority of malware is delivered via web browsing, skirting AV along the way.

Alleged fight between anti-spam group and blacklisted company incites massive DDoS

Alleged fight between anti-spam group and blacklisted company incites massive DDoS

Spam-fighting nonprofit Spamhaus says the DDoS attacks began more than a week ago.

Research reveals 94 percent of endpoints currently running outdated versions of Java

Owing to outdated browsers, an attack aimed at older Java vulnerabilities can be just as successful for miscreants as targeting new vulnerabilities, according to new research.

Report: Among simple, yet effective web app attacks, cloud environments hit hardest

A security firm found that more than half of survey respondents were impacted by web application attacks.

Draft of cyber bill exacerbates flaws of anti-hacking law

Draft of cyber bill exacerbates flaws of anti-hacking law

The bill draft, which is in a preliminary stage, included harsher penalties for Computer Fraud and Abuse Act violations.

Spear phishes used to infect South Korean corporate networks

Security researchers have found evidence that, not surprisingly, social engineering tactics were leveraged by the attackers, who set their malware to "go off" three days after reaching victims.

New "watering hole" attack plants malware at news sites to spy on Chinese dissidents

New "watering hole" attack plants malware at news sites to spy on Chinese dissidents

A recently fixed Internet Explorer vulnerability is being leveraged to spy on the activists.

VSkimmer trojan steals card data on point-of-sale systems

VSkimmer trojan steals card data on point-of-sale systems

The trojan was recently a topic of discussion on an underground Russian forum, researchers found.

Apple releases two-factor authentication

Apple releases two-factor authentication

Apple ID and iCloud users will now have the option to use the security feature for purchases or account changes.

Yontoo adware used to cash in on clicks targets Mac and Windows users

Saboteurs are spreading the Yontoo trojan, which infects computers so they display certain advertisements to infected users.

South Korean corporations hit by widespread attack that wiped data and shut down systems

Researchers at Symantec believe a trojan called "Jokra" was used in the attacks. Neighboring North Korea is considered a suspect, but there's no evidence suggesting it is to blame.

Lawmakers propose change to "outdated" email privacy law

Senators say current provisions of the Electronic Communications Privacy Act give law enforcement too many liberties when accessing the electronic communications of Americans.

Florida voting "hack" shows how voting is susceptible to logic attacks

A failed attempt to rig an election in Florida doesn't mean hackers won't find another way in as electronic voting becomes more common.

Two men charged with hacking Subways to load up gift cards

The defendants are accused of selling vulnerable point-of-sale equipment to Subway franchises, and then hacking into the systems to add $40,000 in value to gift cards, which they sold or kept for themselves.

Experiment shows how often hackers want to attack critical infrastructure

Experiment shows how often hackers want to attack critical infrastructure

Honeypots installed by researchers at security firm Trend Micro provided bait for 39 attacks on simulated ICS environments over the course of a month.

Hacker who wanted to embarrass AT&T sentenced to 41 months

Andrew Auernheimer is an alienating figure in certain web communities, but many security researchers have come to his defense, claiming he's a victim of an overreaching criminal justice system. Prosecutors disagree.

Welcome to the new and improved SCMagazine.com

Welcome to the new and improved SCMagazine.com

With new capabilities and seamless design, the top website for information security news, opinions, analysis and more has gone through a comprehensive redesign.

Popular ad blocking app nixed from Google Play

Known for creating an undeterred web surfing experience and bolstering privacy, Google has decided to remove AdBlock Plus from its Android market place.

Apple updates Mountain Lion OS, includes Java Web Start fix

Apple updates Mountain Lion OS, includes Java Web Start fix

The security update patched 21 vulnerabilities and a Java Web Start bug that could allow apps to be launched automatically.

Legal fight between Cisco and Swiss firm continues with latest data theft accusations

Swiss firm Multiven has accused Cisco of using "scraping" software to steal thousands of its files.

AT&T hacker to submit plea for lesser sentencing

AT&T hacker to submit plea for lesser sentencing

According to a court document, Auernheimer and his legal team believe he should serve months of probation rather than years behind bars.

Cyber criminals offer black market peers bug discovery service

The new offering shows that, as cyber criminals become more sophisticated, they'll need more options to secure their infrastructure.

DoD creating cyber "offensive" teams to strike back against foreign attackers

DoD creating cyber "offensive" teams to strike back against foreign attackers

Cyber Command Chief Gen. Keith Alexander is now assembling 13 teams of IT experts for this purpose.

Retailer fights PCI fines for noncompliance after breach, sues Visa

Sportswear retailer Genesco is suing Visa after the credit card company imposed more than $13 million in fines.

Study finds iOS apps to be riskier than Android

Study finds iOS apps to be riskier than Android

The results of a recent report indicate that apps on the iOS mobile platform access more information on a device than Android.

Microsoft pushes seven patches, including fix for "evil maid"-style attack

The vulnerability allows anyone with "casual physical access, such as a custodian sweeping your office at night or a security guard making his rounds" to plug in a USB device and become an administrator, according to Microsoft.

Hackers claim to expose info of first lady, including other officials and celebs

The data allegedly includes Social Security numbers, financial information and other sensitive details belonging to a list of high profile public figures.

China's foreign minister: Cyber space needs rules, not war

The Chinese official said the country is being unfairly singled out as a purveyor of corporate espionage, and it is supportive of developing agreed-upon international rules of conduct in cyber space.

FTC lodges new set of complaints against alleged cell phone spammers

FTC lodges new set of complaints against alleged cell phone spammers

Defendants are charged with inundating consumers with texts promising "free" gift cards - and running sites that profited off the scam.

Hacktivists plan to resume DDoS campaign against U.S. banks

A group of hackers is dissatisfied with efforts to remove an anti-Muslim video from YouTube.

Microsoft schedules seven security patches for monthly Patch Tuesday

They address flaws in Internet Explorer (IE), Windows, Office, Server Software and Silverlight.

Judge throws out lawsuit over LinkedIn password breach

The plaintiffs failed to prove that a 2012 breach caused them financial loss or future harm, despite their claims that publicly posted credentials placed them at greater risk for identity theft.

Down go Chrome, Firefox, IE 10, Java, Win 8 at Pwn2Own hacker fest

Down go Chrome, Firefox, IE 10, Java, Win 8 at Pwn2Own hacker fest

Despite the best efforts by browser and operating system manufacturers to shore up their offerings, exploit hunters are still finding success at attacking the world's best-known platforms - especially when there is a large chunk of change on the line.

Attackers use stolen certificate to sign malicious Java applet

Researchers believe the stolen private key belonged to an unwitting Texas consulting company.

MiniDuke espionage ring began earlier than first reports suggest

Attackers behind the MiniDuke spy campaign have targeted government entities and other organizations around the world since at least 2011.

Hotel tech trade association offers best practices for reducing payment card risk

Hotel tech trade association offers best practices for reducing payment card risk

When it comes to credit card fraud, the hospitality industry has offered an attractive target for cyber criminals. Now, one trade group is helping these properties overcome security and compliance hurdles with a new framework.

Oracle pushes patch for Java vulnerability after exploit reports surface

The company apparently was able to distribute a fix so quickly because it actually learned of this vulnerability on Feb. 1, but wasn't able to include a patch in the Feb. 19 update to Java.

Evernote discloses password breach, while critics bemoan its use of crackable crypto

Evernote discloses password breach, while critics bemoan its use of crackable crypto

The company advised its 50 million users on Saturday that it "detected and blocked suspicious activity on the Evernote network that appears to have been a coordinated attempt to access secure areas" of its service.

Apple won't let users run Flash unless it is the latest version

The move follows two instances in the past few weeks when Adobe unexpectedly issued a Flash Player update to close vulnerabilities under active attack.

Another Java exploit spreading

Just a few weeks after Oracle rushed a patch for the commonly exploited Java software, it is experiencing yet another meltdown.

Threat of the month: Java zero-day

Threat of the month: Java zero-day

Java zero-days are the "threat of the month," a vulnerability that allows remote code execution via browsers.

Company news: CipherCloud, Yahoo, and Twitter's company announcements

The latest acquisitions and personnel moves from the likes of CipherCloud, Yahoo, Marble Cloud, Twitter, and more.

News briefs: NY Times and Twitter hacked, cyber security executive order, and more

Security incidents at the U.S. Department of Health and Human Services and Zaxby's Franchising, and more.

Study finds that growth of security workers is needed, though budget constraints remain a hurdle

Robust growth in the information security profession is a sign of economic health in the overall economy, according to a new report from (ISC)2. And personnel skilled in emerging technologies and security as a business will be the ones who excel.

Sentencing for "Sabu" delayed, while Hammond awaits trial with same judge

Hacktivist-turned-snitch Hector Monsegur, aka Sabu, was scheduled to be sentenced Friday in New York, but the hearing was not held for an unknown reason.

Twitter embraces DMARC standard to stymie phishing attacks

Twitter announced Thursday that is adopting Domain-Based Message Authentication, Reporting and Conformance (DMARC), a new specification designed to authenticate emails so users don't fall for fraudulent emails.

FTC whips HTC over poor software coding, developer training and researcher outreach

The consumer protection agency said vulnerabilities and the "insecure implementation" of diagnostic software propelled action against the American division of the mobile device maker for a number of security shortfalls.

Malware once used exclusively for bank fraud is finding a new mission

Cyber criminals are repurposing data-stealing trojans, once used primarily to steal banking information, to collect intellectual property, which can be sold for a higher price tag, according to a McAfee study.

Phishing emails use fake Mandiant China spy report bait to target victims

Phishing emails use fake Mandiant China spy report bait to target victims

Security firm Seculert is tracking two versions of the threat: one which is targeting Japanese organizations and the other directed, ironically, toward Chinese journalists.

U.S. may rely on trade sanctions, fines to curb foreign cyber spy threat

U.S. may rely on trade sanctions, fines to curb foreign cyber spy threat

The news comes after a detailed report emerged that U.S. firms were the target of Chinese government-backed espionage operations.

Google says account takeovers are down more than 99 percent

The tech giant is crediting the drop with new security measures, in which login attempts to accounts such as Gmail are tested against 120 variables to ensure a person is who they say they are.

Report on China spy threat may make attackers have to work harder

Security firm Mandiant may have documented among the most convincing evidence to date of the significant espionage threat emanating from China.

Report: Apple hacked in "sophisticated" attack

On Friday, Facebook announced that a number of employee laptops were infected with malware after workers visited a mobile developer website that had been hijacked. On Tuesday, Apple said it was hit with a similar attack.

iPhone passcode flaw opens device to intruders

The passcode flaw affects iOS 6.1, allowing pranksters to bypass its security feature.

Following cyber order from Obama, CISPA is back

Following cyber order from Obama, CISPA is back

Lawmakers have begun debate on the controversial threat information-sharing bill known as CISPA, which would complement the president's cyber security executive order. But it has a host of privacy objections to clear first.

Retail, food service industry top target of fraudsters

Attackers primarily want cardholder data, which can be easily bought and sold underground to commit fraud, according to security firm Trustwave.

Adobe verifies Reader vulnerabilities, offers workaround

Exploits that are taking advantage of the vulnerabilities are able to evade Adobe's sandbox technology, which was implemented with the release of Reader and Acrobat X.

Known bugs could be to blame for zombie alert prank

Viewers of four TV stations, in Michigan and Montana, had their Monday evenings interrupted by an Emergency Alert System broadcast warning of a zombie invasion. It turned out to be a hacking hoax.

Two charged in $3m Chase, Capital One skimming bust

Two men have been indicted in Manhattan on charges they operated a nationwide ATM skimming ring that defrauded bank customers out of more than $3 million, the U.S. attorney's office has announced.

Adobe Reader exploit spotted in the wild

Adobe may be dealing with another zero-day vulnerability, this time appearing in the latest version of its PDF software, Reader.

Microsoft patch fixes critical IE flaws

One security bulletin fixes 13 flaws that could allow an attack to remotely execute code in several versions of IE.

Presidential cyber security order almost ready

As comprehensive cyber security legislation languishes in Congress, President Obama may be close to acting on an executive order, according to a report.

One-fifth of malicious mobile websites are porn-related

In the PC world, attackers prefer to compromise legitimate sites to spread malware. But in the realm of mobile, pornographic sites are the preferred launching pad for viruses.

Hackers hijack Bit9 to target its customers with malware

The whitelisting company says it was breached because it failed to install its own software on a number of its computers, giving saboteurs access to a code-signing certificate.

PCI council clarifies merchant's cloud security obligations

The Payment Card Industry Security Standards Council (PCI SSC) released recommendations for card data security and compliance in cloud environments.

Adobe updates Flash to address targeted exploits

The software company has updated its ubiquitous Flash software because of two pressing zero-day vulnerabilities.

Microsoft to plug 57 security holes next week

The software giant expects to release a dozen patches on Tuesday, but all eyes are on two bulletins that address security flaws in Internet Explorer.

Fraud could rise if retail customers use Facebook login

Half of new retail customer identities will be social networking-based by the end of 2015, which is why merchants need to boost their controls, according to Gartner.

Microsoft, Symantec team up to smash click-fraud botnet

Microsoft, in partnership with security firm Symantec, announced Wednesday that it has disrupted the Bamital botnet, known for rerouting victim machines to websites, online advertisements and links of the attackers' choosing.

Internal site hacked, Federal Reserve confirms

On Sunday, Anonymous said it hacked the Fed, before exposing the data of 4,000 bankers. Now, it appears the claims are true.

Hacker in $14M click-fraud scam pleads guilty

Valeri Aleksejev, an Estonian, pleaded guilty for his role in "Operation Ghost Click," where DNSChanger malware infected four million computers worldwide.

Energy Department latest to be struck by skilled hackers

Several hundred employees and contractors at the U.S. Department of Energy were compromised in the breach, though reportedly no classified information was accessed by hackers.

Anonymous claims to expose bank executive details

The move was part of a larger operation by the hacktivist collective to protest prosecutorial overreach in computer crime cases, prompted by the death of Aaron Swartz.

Twitter succumbs to "extremely sophisticated" attack

Twitter, with more than 500 million registered users globally, may soon be adding additional login protections. The company disclosed Friday that 250,000 people may have had their account data compromised.

App owner to pay $800k to settle child privacy charges

Path, a company that operates a virtual journal application for iOS and Android devices, agreed to pay the FTC $800,000.

Rep. Lofgren revises "Aaron's Law" with additional protections

Two weeks ago, Rep. Lofgren took to Reddit to announce her plans to revise the Computer Fraud and Abuse Act so that people like Aaron Swartz, the computer programmer and freedom-of-information activist who committed suicide in January, are not punishable by decades in prison.

PCI e-commerce guidance issued for merchants

The council charged with administering the PCI standard has documented common vulnerabilities in online payment environment and offered suggestions for installing technology to deter threats.

Company news: Big additions to teams at Lancope, SafeNet, and more

The latest personnel announcements and M&A activity from the likes of Lancope, SafeNet, BeyondTrust, Blue Coat Systems and more.

News briefs: The latest breaches, malware and hacktivist activities

This month's news briefs include bits on Android, spammers, breach penalties, crime networks, hacktivism and more.

New York Times breach opens anti-virus, attribution debate

The New York Times Co. is the latest victim of an advanced persistent threat attack after the paper disclosed that hackers roamed its systems for four months, looking for correspondence related to a single story.

Sign up for our newsletters

POLL