Top Russian Cybercrimes Agent Arrested on Charges of Treason ...
A senior official in the Russian cyberintelligence department that American officials say oversaw last year's election hacking has been arrested in Moscow on charges of treason, a Russian newspaper re...
How To Not Get Hacked, According To Expert Hackers
Recently, Kevin Roose got hacked. The hack was so bad that several security experts have told him it’s the worst one they’ve ever seen. This is what he learned.
Russian Hackers of Dow Jones Said to Have Sought Trading Tips
A group of Russian hackers infiltrated the servers of Dow Jones & Co., owner of the Wall Street Journal and several other news publications, and stole information to trade on before it became public, ...
Apple's App Store hit by malware attack in China
Apple has said it is taking steps to remove a malicious program found in a number of applications used by owners of iPhones and iPads in China. It is thought to be the first large-scale attack on Appl...
This New Rombertik Malware Crashes Your PC Once Detected
A complex malware dubbed as Rombertik has been designed to steal user data and comprises of several layers of anti-analysis functionality and obfuscation -
Someone stole naked pictures of me. This is what I did about it – video
The issues of revenge porn and hacked photos are part of a larger problem with our relationship to consent, argues Emma Holten
As Flash 0day exploits reach new level of meanness, what are users to do?
Only a few weeks in, 2015 is shaping up as one of the most perilous years for users.
OP hit by another denial of service attack
Some users may encounter issues using the online services of the financial services group.
Computer spying malware uncovered with 'stealth' features-Symantec
Nov 23 (Reuters) - An advanced malicious software application has been uncovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries,...
The Unpatchable Malware That Infects USBs Is Now on the Loose
It’s been just two months since researcher Karsten Nohl demonstrated an attack he called BadUSB to a standing-room-only crowd at the Black Hat security conference in Las Vegas, showing that it’s possi...
Watch 15 Awesome MS-DOS Viruses in Action
Daniel White has amassed perhaps the most comprehensive archive of malware-in-action found anywhere on the web.
Digital Attack Map
A live data visualization of DoS attacks around the globe
Computer virus
Computer viruses range from pesky to outright dangerous. Some just display a message, while others erase your entire hard disk. Clicking on what looks like a...
Computer virus - Video
Computer viruses range from pesky to outright dangerous. Some just display a message, while others erase your entire hard disk. Clicking on what looks like a...
Cybercrime
Computer crime, or cybercrime, is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime is criminal exploita...
Denial-of-service attack
In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.A DoS attack generally cons...
Denial-of-service attack - Wikipedia
Malware
Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware is defined by its malicious...
Null character
The null character (also null terminator), abbreviated NUL, is a control character with the value zero.It is present in many character sets, including ISO/IEC 646 (or ASCII), the C0 control code, the ...
Shoulder surfing (computer security)
In computer security, shoulder surfing refers to using direct observation techniques, such as looking over someone's shoulder, to get information. It is commonly used to obtain passwords, PINs, secur...
Top Russian Cybercrimes Agent Arrested on Charges of Treason ...
A senior official in the Russian cyberintelligence department that American officials say oversaw last year's election hacking has been arrested in Moscow on charges of treason, a Russian newspaper re...
Call gate
A call gate is a mechanism in Intel's x86 architecture for changing the privilege level of a process when it executes a predefined function call using a CALL FAR instruction.
Call gates are intend...
Apple's App Store hit by malware attack in China
Apple has said it is taking steps to remove a malicious program found in a number of applications used by owners of iPhones and iPads in China. It is thought to be the first large-scale attack on Appl...
Project 25
Project 25 (P25 or APCO-25) is a suite of standards for digital radio communications for use by federal, state/province and local public safety agencies in North America to enable them to communicate ...
Project 25 - Wikipedia