- Welcome Guest
- Sign In
Chinese telecom ZTE may have ended 2012 in the red, but a new report alleges there was enough in the coffers for bribes. ZTE's Mongolia office is being investigated for bribery, according to China's IT Business News. The outlet is also reporting that Mongolian anti-corruption officials have alread...
A U.S. District Court judge from the Ninth Circuit found that the government's controversial use of so-called National Security Letters violates the First Amendment and the concept of separation of powers. U.S. District Judge Susan Illston ordered the government to stop issuing the National Security...
Just when we thought the spam scourge was over, it appears it's making a comeback. After four straight quarters of decline, spam volumes on the Internet rose 92 percent in February, according to security firm Eleven Research Team. Nasty forms of spam also showed significant increases. Phishing email...
A busy week on the U.S. cybersecurity front is pointing toward a renewed emphasis on the nation's digital defenses, a shift underscored by Tuesday's Senate testimony from a top security official that ranked hackers and cyberattacks as greater threats to the country than Al Qaeda and terrorism. "Righ...
A pair of new reports suggest that despite repeated attempts by the Obama administration to beef up U.S. cybersecurity, the nation is not ready to handle a major attack, and government agencies lag far behind deadlines for showing security improvements. Those conclusions are reached in the Office of...
After taking it on the chin for its alleged attacks on U.S. media outlets -- and for its army reportedly backing hackers engaged in cyberespionage around the world -- China returned fire. The government claimed its defense and military ministries' websites are being bombarded with 144,000 hacking at...
Having established its credentials as a key player in the consumer smartphone world, Samsung is bolstering security to take a stab at business users, a demographic traditionally dominated by BlackBerry. For the past year, Samsung has been beefing up the Android software that powers its smartphones t...
Hackers used a highly customized piece of malware that takes advantage of a recently revealed Adobe flaw to spy on governments and institutions worldwide, security firm Kaspersky Lab announced Wednesday. The 59 victims in 23 countries include government entities in Ireland, Belgium, Portugal, Ukrain...
Still smarting from a recent attack on its systems, Facebook started its week with a discovery by researchers at Bitdefender that an infected add-on at the Chrome Web Store was planting malware on its members' computers. The malware, among other things, was padding the Like counts on dummy Facebook ...
Chinese Foreign Ministry spokesperson Hong Lei reportedly said at a briefing on Tuesday that China's military was not involved in any recent cyberhacking. His comments were apparently in response to allegations in a new report by Mandiant. Among its many findings is the existence of a 12-story white...
Europol announced Wednesday the breakup of a gang of cybercriminals who allegedly ran a ransomware scheme to extract money from online users in 30 countries. Spanish police, working alongside Europol's European Cybercrime Center, made 11 arrests in an action dubbed "Operation Ransom." The cyberthiev...
Too much regulation, not enough protection, too much private sector involvement: President Obama's just-released cybersecurity executive order has sparked concern from several advocacy groups, even as controversial legislation designed to protect the nation's infrastructure made a reappearance Wedne...
While many Americans watched the wrap-up of the Super Bowl Feb. 3, the band of hackers called "Anonymous" broke into a Web-facing server at the Federal Reserve and pilfered a list of some 4,000 people who work in the banking industry -- many of them ranking executives at banks and credit unions. Lat...
The European Union on Thursday announced a strategic plan designed to prevent and respond to cyberdisruptions and attacks. The heart of the plan: a requirement that all member states and key Internet enablers -- including some U.S.-based companies -- must report attacks. Web-based companies and crit...
President Obama can order a preemptive strike if there's credible evidence of a pending major cyberattack from abroad, a secret legal review reportedly has found. New policies will dictate how intelligence agencies can monitor remote computer networks elsewhere for signs of potential attacks on the ...