Faced with few options, companies are increasingly ceding to cyberattackers' demands for payment after holding their stolen data hostage, while law enforcement struggles to catch nearly invisible foes.
Stories by Jeremy Kirk
An alternate method for infecting computers with ransomware signals a shift in tactics by cybercriminals that could put businesses at greater risk, according to Symantec.
Facebook-owned WhatsApp has strengthened the encryption of its widely used instant messaging app, a development that in theory makes it harder for law enforcement to gain access to communications.
The Trump Hotel Collection said on Monday it is working with the Secret Service and FBI to investigate a payment card breach, its second one in less than a year.
CloudFlare is tweaking its systems to make it easier for legitimate Tor users to access websites that use its content delivery system.
MedStar Health said Wednesday it is restoring its computer systems following a cyberattack that reportedly involved file-encrypting malware.
CNBC inadvertently exposed peoples' passwords after it ran an article Tuesday that ironically was intended to promote secure password practices.
A large health care provider in the Washington, D.C., area said it has resorted to using paper transactions after malware crippled part of its network early Monday.
Cybercriminals are redoubling efforts to steal payment card details from retailers before new defenses are put in place, according to FireEye.
A researcher with RSA says faulty firmware found in security cameras sold by at least 70 vendors may be a contributor to many of the credit card breaches that have proved costly to retailers.
A malware researcher has found a few tricks to stop one of the latest types of ransomware, called Locky, from infecting a computer without using any security programs.
Three men who allegedly were part of a multi-year hacking campaign with the Syrian Electronic Army (SEA) left a long digital trail that didn't make them hard to identify, according to court documents.
The Tor Project is fortifying its software so that it can quickly detect if its network is tampered with for surveillance purposes, a top developer for the volunteer project wrote on Monday.
Apple's iMessage system has a cryptography flaw that allowed researchers to decrypt a photo stored in iCloud, the Washington Post reported on Sunday.
Here's a quick and dirty guide to SSL/TLS, one of the most important technologies for securing data on the Internet.
- Senior Full-Stack .NET Developer VIC
- Contract Systems Analyst (Linux/Orcale/MySQL) 160531/SA/253 Asia
- Multiple Oracle Fusion SOA/BPEL Developer Opportunities VIC
- Systems Engineer - NV2 ACT
- Informatica Powercenter Specialist NSW
- Analyst Programmer (J2EE/Oracle/SQL*PLUS) 160519/AP/432 Asia
- Security Administrative Support Officer ACT
- Microsoft System Engineer - NV1 ACT
- Data Engineer | Real Time Streaming NSW
- Azure Consultant QLD
- Help us better understand the trends and major practices related to technology use in STEM education. Take this two minute survey NOW.
- F5 Security Hub NEW Look - Try us out today
- NEW Gigamon Transform Security Zone - Find out more now!
- APJ businesses think they will be breached: Here's why: Read the article NOW
- Hear from those who have been there, done it and transformed their business for the better with AWS Cloud. View their stories and other informative AWS sessions On-Demand.