After NBC News aired a report warning visitors to the 2014 Sochi Winter Olympics that it will be "open hunting season" for hackers, security experts - including the one shown in the report - are saying the report is overblown and misleading.
Last week, it wasn't clear how the hackers who caused Target's massive credit card breach got into the company's payment system: it was just clear that credentials were stolen or hacked. In a report from Krebs on Security on Wednesday, the answer might have been found -- and it's stranger than you might guess.
It looks like the U.K.'s spy agency has it's own Low Orbit Ion Cannon, and it's not afraid to use it - or restricted from targeting non-terrorism related civilians.
It's a relatively new playing field, but cyber security is no joke, and the Obama administration is making that clear. Acting Assistant Attorney General Mythili Raman told a Senate Judiciary Committee hearing Tuesday that the government would like for there to be new regulation that requires retailers to quickly report electronic identity thefts.
Some new details are emerging about how the hackers who breached Target's credit card system and installed malware on their point of sales terminals managed to accomplish their cyber-heist.
After the huge Target credit card breach during the holiday shopping season was announced, several other retailers were reported to have been affected by the same hackers or malware. Now the U.S. Federal Bureau of Investigation is warning U.S. retailers to prepare for more cyber attacks, as more cases of related to the Target hacking appear.
Hunter Moore, a 27-year-old internet pornography mogul who helped create a new, nauseating, genre of pornography - so-called "Revenge Porn," was arrested by the FBI and indicted on federal charges this week, along with an alleged accomplice.
Neiman Marcus has finally disclosed how many of its customers have been affected by a security breach that it previously disclosed to the public. About 1.1 million customers, according to the high end retail store, have been affected over the last three months by a security breach that has also affected Target and other big retailers.
The annual most common (i.e., worst) passwords list has been released, and there's good news and bad: the most egregiously obvious password has been downgraded from the number one slot, but its replacement isn't that much better.
Internet rights advocacy group Electronic Frontier Foundation took the trouble to "score" President Obama's promises on reforming the National Security Agency's snooping practices.
You may have been the target of cybercrime if you shopped at brick-and-mortar Target stores during the Christmas shopping season. But you might also be in danger if you shopped in six other yet-unnamed retailers, according to a recent report.
Just as the "Internet of Things" (IoT) - the interconnected world of appliances, gadgets, medical devices, wearables, and media centers - was just getting off the ground, the first ever cyberattack on smart appliances took place this week, according to security service Proofpoint.
After ex-contractor Edward Snowden's leaks sparked months of revelations about the National Security Agency's collection of U.S. phone records, as well as a breadth of other sweeping NSA surveillance programs, President Barack Obama spoke on Friday about changes he plans to make to the agency's mass data collection policies.
Beware, fans of Starbucks and fans of paying for coffee with your smartphone! A big problem has been discovered relating to how the Starbucks mobile app processes its data, and while Starbucks is working to fix the app, users aren't in the clear yet.
Researchers at the University of Michigan have come up with a mathematical model that they say determines the most advantageous time for hackers to launch a cyber attack. The research could be used to help cybersecurity be on the alert at the right time and prepare for future attacks.
According to a new report from The New York Times, citing National Security Agency documents, "computer experts and American officials," the NSA has an ability to gain access to computers and alter their software remotely, using radio waves.
Ever since ex National Security Agency contractor Edward Snowden leaked a ton of top-secret material detailing many of the agency's projects and capabilities, any illusion of data privacy has been thoroughly stomped out. There are basically two reactions to this disquieting knowledge: to say "oh well" and continue about your life or try harder to protect your data. A new smartphone, called Blackphone, hopes to cater to the second type.
After about 4.6 million Snapchatters' usernames and phone numbers were exposed by a hack of a security vulnerability that the young social media company was repeated warned about, Snapchat has issued an apology and an update to its app.