Cybercrime and Hacking - News, Features, and Slideshows
About 4.5 million people in 28 states face the risk of identity theft due to a massive data breach at Community Health Systems (CHS) a Franklin, Tenn., based health network.
By Jaikumar Vijayan | 19 August, 2014 05:19
A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company's stores in June and July.
By Jaikumar Vijayan | 16 August, 2014 03:36
In a new trend, Windows tech support scams have gone home-grown, with twists that include bogus warnings from malicious websites urging users to call a toll-free number for "help."
By Gregg Keizer | 12 August, 2014 05:17
The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the US payment system to smartcard technology can't happen fast enough.
By Jaikumar Vijayan | 16 August, 2014 20:49
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.
By Jaikumar Vijayan | 14 March, 2014 10:27
Retailers and banks must move quickly to figure out who should be responsible for better securing the payments system network or risk having Congress decide for them.
By Jaikumar Vijayan | 23 January, 2014 16:05
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
- FTDigital Marketing CoordinatorNSW
- FTAccount Manager - DataNSW
- FTClient Service Director - Search: SEO & PPCNSW
- FTSenior SEO ManagerNSW
- FTStudio Design ManagerVIC
- FTDigital Performance Manager - MediaNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTChief Information Officer - CSIROACT
Although government agencies invest large sums of money into their IT defenses, an unknowing user can help adversaries dethrone even the most regal of security systems, that's why proper precautions are needed in expanding your mobile strategies. Read more
- North Korea reportedly blocks Facebook and Twitter
- FCC eyes new rules to protect consumers as voice networks transition to IP
- Startup Slack gets $120M infusion to kill email at work
- Oracle's Larry Ellison isn't done building his legacy
- Microsoft Releases NEW Office for the Mac (Oct/2014)
- Microsoft teases Office for Mac with Outlook-only release
- Ericsson's WebRTC browser available for download from the App Store
- HP to jolt 3D printer market
- Starbucks says 1 in 6 payments already mobile
- HP's radical new Machine could start computing by 2016
- Apologetic Microsoft unleashes Xim globally for Android, Win Phone
- FCC: A range of net neutrality options remain on the table
- iOS 8 app crash rate falls 25% since release
- Pirate Bay co-founder sentenced to 3.5 years imprisonment in Denmark
- Google to kill off SSL 3.0 in Chrome 40