cybercrime - News, Features, and Slideshows
- North Korea wants joint probe into Sony hack, warns of consequences if not
- Sony hack was 'cyber vandalism,' not act of war, says Obama
- Sony looking for ways to distribute 'The Interview' online
Sony Pictures says it hasn't bowed to threats to pull "The Interview" and audiences will get a chance to see it -- it's just not sure how at present.
The hack of Sony Pictures, blamed on North Korea by the FBI, was not an act of war, President Obama said in an interview broadcast on Sunday.
Denying responsibility for a major hack on Sony Pictures, North Korea has proposed a joint investigation with the U.S. but promised "serious consequences" should its offer be rejected.
President Obama believes Sony made a mistake in canceling release of "The Interview" following a major cyberattack and said the U.S. is prepared to respond to the attack, but he wouldn't say when or how.
North Korea was responsible for the devastating cyberattack on Sony Pictures, the U.S. Federal Bureau of Investigation said Friday after a two-week investigation.
Leaders of the tech sector laud the Obama administration's rollout of voluntary cybersecurity guidelines, but broader private-sector adoption could remain a challenge.
It may be difficult to remember now, but not too long ago, cyberattacks rarely made headlines in mainstream news. That's not to say that these advanced persistent threats, sometimes state-sponsored or the product of organized crime, were uncommon. On the contrary, they were booming. It was just that few people liked to talk about them.
It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
Whitepapers about cybercrime
Eight breaches in 2013 provided a painful reminder that cybercrime remains prevalent. This year’s report once again covers the wide-ranging threat landscape, with data collected and analysed by security experts, while calling out seven areas that deserve special attention.
- Cybercrime group steals millions from Russian banks, targets US and European retailers
- South Korea nuclear operator runs drill after alleged hacker threat
- Exploits for dangerous network time protocol vulnerabilities can compromise systems
- Tor warns of possible disruption of network through server seizures
- Tor network offline in coming days due to Possible seizure
- Apple reopens Russian online store after boosting iPhone 6 price by 35%
- Google wants to turn browser signals of Web encryption upside down
- Decisions, decisions: Choices abound as data center architecture options expand
- Texas Instruments builds an alternative energy for the Internet of Things
- Top 3 Australian financial scams of 2014
- Optus Business boosts Microsoft skills with Ensyst acquisition
- New Vocus/Amcom entity will have initial personnel restructure
- Schneider Electric wins 2014 Platts Global Energy Award
- New undersea cable to link Australia and New Zealand
- Communications service providers will face heavy capex in coming years: Ovum
- Being the first CMO: Mint Wireless' Justus Hammer talks data and results-driven marketing
- Fashioning a new style of customer interaction at The PAS Group
- Infographic: Top digital trends in 2015
- Technology, simplicity and culture: Behind the scenes of Sensis’ digital transformation
- Melbourne Stars look to fan engagement with mobile marketing offer