Theft of demographic data on 70 million customers represents vastly larger, more serious attack.
Cyber-criminals had more than two weeks to pluck through 40 million customer accounts, Target confessed.
Analysts calculate that buying zero-day vulnerabilities would be an order of magnitude less expensive than cleaning up after cyber-crimes.
Hacking drones could become a threat to mass-market adoption of UAVs.
Sending bogus text strings in HTML requests could have given attackers control over the configuration of some D-Link routers.
Google quashes a pair of bugs in 10 days after researcher creates a simple exploit to take advantage of a complex set of flaws.
Reports over the past several weeks have pointed to potential malware — a variation on the Shiz banking-related Trojan — …
Efforts at fake validation increased by 50 percent in one quarter; Android exploit count driven 33 percent by validation-avoiding malware.
IT security staff, pushed to respond to immediate threats, often make decisions based on emotion rather than data.
NSA bolstered front-door data collection by connecting directly to networks connecting datacenters belonging to Yahoo and Google, all without the search companies’ knowledge.