Dutch intelligence services can receive bulk data that might have been obtained by the U.S. National Security Agency (NSA) through mass data interception programs, even though collecting data that way is illegal for the Dutch services, the Hague District Court ruled Wednesday.
Just a couple days after a security researcher alleged that iOS contained "backdoor" access to user information, Apple has posted a knowledge base article explaining many of the systems that were under scrutiny.
Businesses wanting the security of BlackBerry Enterprise Service 10 without the complexity of managing it onsite can now buy it as a hosted service from six BlackBerry partners.
A ransomware threat that encrypts files stored on the SD memory cards of Android devices has been updated to target English-speaking users with FBI-themed alerts.
A group of nearly 100 University of Adelaide computer science students is beginning their third day in a computer-security intensive program that was co-ordinated by a School of Computer Science security researcher and PhD candidate.
Two people have been sentenced to a total of 14 years in prison for conducting a Phishing campaign that targeted banking details. The criminals accused, Constanta Agrigoroaie, 23, and Radu Savoae, 28, used the stolen funds as a means to bring foreign criminals into the U.K.
A vulnerability in a web-based graphics system led to a breach of The Wall Street Journal's network by a hacker, the newspaper acknowledged late Tuesday.
A company that specializes in selling information on software vulnerabilities has reignited a debate over the handling of such information, especially when it pertains to privacy-focused tools.
Nigerian scammers known for grammatically challenged email promising riches in return for a small up-front payment are moving into the business of launching malware attacks against companies.
Google and Samsung have clarified that Knox features destined for Android L won’t include the best parts of the Korean company’s enterprise security features for Android.
Apple has "inadvertently admitted" to creating a "backdoor" in iOS, according to a new post by a forensics scientist, iOS author and former hacker, who this week created a stir when he posted a presentation laying out his case.
Juniper Networks has divested its mobile security product line, selling the assets to a private equity firm for $250 million.
The TOR Project thinks it has figured out how the author of a canceled Black Hat talk cracked its software to mask the source of Internet traffic, and it is working on a patch.
Sky, TalkTalk, BT and Virgin Media will send customers who download illegal files over their network "education letters", the latest initiative in the UK crackdown on online piracy.
Information security has never been a more sensitive subject than it is these days, so it's little surprise that allegations from a security researcher that iOS contains a "backdoor" permitting access to users' information provoked a strong response from Apple.
In May, a grand jury in the Western District of Pennsylvania indicted five members of the Chinese military on charges of hacking and economic espionage, according to a May 19 U.S. Department of Justice media release. Per the same release, the targets were six U.S. enterprises operating in the solar products, nuclear power, and metals industries. The attacks began as early as 2006 and were carried out over many years and into this year, according to the same release.
Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.
Banks across Europe are now coping with a wave of cybercrime in which crooks are transferring funds out of customer accounts through a scam involving bypassing some two-factor authentication systems to steal large sums, according to a security firm assisting in the investigation.
As iOS 8--and, presumably, new iPhone and iPad hardware--approaches its release day, big changes are on the horizon for Apple's Touch ID, a technology that has been met with less enthusiasm than it deserves.
Sophisticated code of the sort used in Russian Government cyberweapons could be seeping into the commercial malware wielded by the country's criminals, a security firm has suggested after analysing the apparent cross-pollination in a previously unknown piece of malware called ‘Gyges'.
Sign up now »
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.