Cyber Crime

Cyber Crime coverage at Computerworld

cyber escape cybercrime

How one personal cyber insurance policy stacks up

As policies designed for consumers emerge, the example from AIG is surprisingly comprehensive.

Hacked, unlocked, unsafe.

1,175 hotels listed in payment card breach of Holiday Inn parent company

InterContinental Hotels Group reported 1,175 IHG-branded hotels were involved in a payment card breach; the investigation is not complete, but so far 1,174 franchise hotels in the US are known to have had malware accessing payment...

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

thief stolen hacked hacker jail prison

Crafty Ohio inmates scavenged parts, built PCs for hacking and hid them in ceiling

Ohio prison inmates built PCs from parts, hid them in the ceiling, connected to prison's network and tried to pull off cybercrimes.

siren emergency

Hacked Dallas sirens get extra encryption to fend off future attacks

Dallas city officials have added extra encryption to bolster the security of outdoor warning sirens hacked early Saturday.

fail stamp

Bank gets lesson in the security failings of third parties

Brazilian bank was an easy target after its DNS provider was compromised.

emergency response alarm critical

Hack of Dallas emergency sirens prompts more warnings to bolster cybersecurity

Dallas emergency management officials continue to investigate a hack that activated all 156 emergency tornado sirens citywide for about 90 minutes early Saturday.

iCloud

The iCloud hackers' bitcoin ransom looks like a fake

A group of hackers who claimed to hold millions of iCloud accounts for ransom said it had been paid. But one bitcoin expert says that's bogus.

NSA headquarters

Angry Shadow Brokers release password for suspected NSA hacking tools

Annoyed with the U.S. missile strike last week on an airfield in Syria, among other things, hacker group Shadow Brokers resurfaced and released what it said was the password to files containing suspected National Security Agency...

hacking cybercrime cybersecurity internet coding programming code

Chinese hackers go after third-party IT suppliers to steal data

Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers.

freefromransomware primary
Update

How to rescue your PC from ransomware

Ransomware is a serious headache. Don't negotiate with e-terrorists. Be a hero and rescue your hostage PC.

020511 pyongyang 1

Banking hackers left clue that may link them to North Korea

The notorious hackers behind a string of banking heists have left behind a clue that reveals a long-suspected link to North Korea, according to security researchers.

security 2016 cybercrime

Project launches to find out if there is truly a link between cybercrime and autism

Is there really a link between cybercrime and autistic-like personality traits? A new project intends to find out and then feed the data into a counter-terrorism program.

07 insider

Insiders -- the invisible threat lurking in your office

With all of the focus in the business world recently related to hackers, we have tended to overlook a group of potential bad actors who have already penetrated our perimeter security, and have access to our facilities – our employees...

chromelogo

Google patches Chrome bug from fizzled Pwn2Own hack

Google has updated Chrome to patch several vulnerabilities, including a bug in the browser's JavaScript engine that a Chinese team tried to exploit at Pwn2Own.

trump thoughful

Trump extends Obama executive order on cyberattacks

President Donald Trump is extending by one year special powers introduced by former President Barack Obama that allow the government to issue sanctions against people and organizations engaged in significant cyberattacks and...

cyberattack

New Mirai IoT variant launched 54-hour DDoS attack against a U.S. college

Researchers have spotted a new Mirai variant in the wild that is better at launching application layer attacks; other researchers spotted a new Cerber ransomware variant that can evade machine learning.

iphone security stock

Scammers scare iPhone users into paying to unlock not-really-locked Safari

Apple has patched a bug in the iOS version of Safari that was used by criminals to spook users into paying $125 or more because they thought the browser was broken.

21394517746 9a77570fae o

Newly leaked documents show low-level CIA Mac and iPhone hacks

The CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.

girl hands privacy stop

Private photos of more celebrities leaked in Fappening 2.0

Photos and videos of more and more celebrities leak in the latest round The Fappening 2.0.

Load More