Approximately 3.6 million Social Security numbers and 387,000 credit and debit card numbers belonging to South Carolina taxpayers were exposed …

Approximately 3.6 million Social Security numbers and 387,000 credit and debit card numbers belonging to South Carolina taxpayers were exposed …
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows …
HSBC has restored access to several of the company’s most important websites rendered inaccessible for ten hours by what is …
The pay-TV operator OSN is reshaping the way we consume media with its video on demand service, offering users the …
The amount of mobile Android malware has surged this year, from a count of 30,000 malware specimens in June to almost 175,000 …
A team of researchers from two German universities has released a study asserting that many of the most popular free …
Microsoft has patched 20 vulnerabilities in Word, Office, Windows, SharePoint Server, SQL Server and other products in its portfolio, including …
Cyber criminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels …
Mohammed Amin, EMC’s Senior VP and Regional Manager for Turkey, Emerging Africa and the Middle East, will now also oversee …
Attackers can abuse Facebook’s phone search feature to find valid phone numbers and the name of their owners, according to …
Iran’s claim that its domestic Internet system suffered a slowdown from a heavy cyber attack is possible, but knowing for …
Details have emerged of an extraordinary attack in which millions of DSL broadband routers in Brazil were hit by a …
A variation of the attack that can wipe data from Samsung Android devices when visiting a malicious Web page can …
Microsoft has now updated Flash on Windows 8 to protect IE10 users from attacks that may have started months ago. …
Over half of Android devices are vulnerable to known security flaws that can be exploited by malicious applications to gain …
Oracle has sued former partner CedarCrestone on grounds it has been providing third-party support for Oracle’s software in an illegal …
A new tool allows Mac OS X attackers with root OS access to easily steal the keychain password data of …
Researchers from security firm Security Explorations have claimed to have discovered a vulnerability in the Java 7 security update …
IT security threats are constantly evolving. It’s time for IT security pros to get ingenious. In that vein, we offer …
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain …