Websites affiliated with U.S. broadcaster NBC were hacked for several hours on Thursday, serving up malicious software intended to steal bank account details. On its own technology blog, NBC released a statement saying, "We've identified ...
Tags: malicious software, NBC, company news
Websites affiliated with U.S. broadcaster NBC were hacked for several hours on Thursday, serving up malicious software intended to steal bank account details. On its own technology blog, NBC released a statement saying, "We've identified ...
Microsoft has confirmed that it's the latest among a number of high-profile technology and internet firms to have been hit by a cyber attack. A blog posted on Friday by Microsoft security manager Matt Thomlinson revealed: Java is a ...
Tags: Microsoft, cyber attack, cyber security
Microsoft last week disclosed that it recently fell victim to the same type of cyber attack that targeted Apple and Facebook. “During our investigation, we found a small number of computers, including some in our Mac business unit, ...
Tags: Microsoft, Cyber Attack, Apple, Facebook
"As reported by Facebook and Apple, Microsoft can confirm that we also recently experienced a similar security intrusion," Trustworthy Computing team general manager Matt Thomlinson said in a blog post. "During our investigation, we found ...
Wesley McGrew, a research assistant at Mississippi State University, may be among the few people thrilled with the latest grim report into a years-long hacking campaign against dozens of U.S. companies and organizations. But McGrew's ...
U.S. consumers experienced the highest level of identity theft in three years in 2012, although much of the fraud losses were absorbed by banks and merchants, according to a new survey. Incidents of identity fraud affected 5.26 percent of ...
Tags: identity theft, US, identity victims
Wesley McGrew, a research associate at Mississippi State University, may be among the few people thrilled with the latest grim report into a years-long hacking campaign against dozens of U.S. companies and organisations. But ...
Tags: US Students, Malware Code, computer security
Burger King saw a surprising upside after its Twitter account was compromised on Monday: tens of thousands of people began following its account. Those people may have started following the burger chain's feed in hopes of seeing more ...
Tags: Burger King, Twitter account, servers
Apple says it has been hit by hackers who wormed their way into the California company's system but evidently failed to steal any data. The maker of iPhones, iPads, iPods, and Macintosh computers said it is working with law enforcement ...
Tags: APPLE, iPhones, iPads, iPods, Macintosh computers
Security vendor Bit9 promised to release limited details of a hack caused by a failure of the company to install the same security software on its own network that it sells to a handful of Fortune 500 companies. Bit9, which is based in ...
Tags: Bit9, security software, network
Microsoft and Symantec have dismantled a botnet that took over millions of computers for criminal activities such as identity theft and click fraud. The Bamital botnet threatened the US$12.7 billion online advertising industry by ...
Tags: Microsoft, Symantec, botnet, click fraud
Two U.S. lawmakers have reintroduced a controversial cyberthreat information-sharing bill over the objections of some privacy advocates and digital rights groups. As promised, Representatives Mike Rogers, a Michigan Republican, and C.A. ...
Tags: cyberthreat, digital rights, US
Software vendors Microsoft and Symantec have "taken down" the Bamital botnet following a joint investigation lasting more than three years. The operation involved shutting down servers that were being used to control hundreds of thousands ...
Tags: Microsoft, Symantec, joint investigation
Children as young as 11 years old are developing malicious code to steal personal information from online gamers, according to antivirus software provider AVG. The Q4 2012 Community Powered Threat Report reveals some schoolchildren have ...
Tags: AVG, malicious code, cyber security