Security News
The DOJ described five years of stealing turbofan engine designs that relied on insiders, state-sponsored hackers, phishing and malware.
Chinese intelligence officers recruited hackers and insiders to help them steal sensitive information from aerospace and technology companies, the U.S. Department of Justice said on Tuesday. read more
Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, says that voters need to put election hacking vulnerability risks into perspective.
Cris Thomas, space rogue, global strategy lead at IBM X-Force Red, discusses the myths and realities of hacking election machines with CNET's Dan Patterson.
This is a long -- and somewhat technical -- paper by Chris C. Demchak and Yuval Shavitt about China's repeated hacking of the Internet Border Gateway Protocol (BGP): "China's Maxim Leave No...
A fifth man has pleaded guilty to federal charges of phishing celebrities' and non-celebrities logins and raiding their iCloud accounts for nude photos.
High-value servers targeted by cyber-weapons dumped online by Shadow Brokers Miscreants are using a trio of NSA hacking tools, leaked last year by the Shadow Brokers, to infect and spy on computer...
Vigilante Hacker Is Killing Unpatched Routers' Remote Administration AbilityCryptojackers and eavesdroppers are continuing to exploit a one-time zero-day flaw in unpatched MikroTik routers,...
A former Virginia high school teacher is the fifth person charged in an investigation into the 2014 "celebgate" scandal in which hackers obtained nude photographs and other private information...
A 21-year-old Kentucky man who previously pleaded guilty to developing, marketing, and selling an infamous remote access trojan (RAT) called LuminosityLink has now been sentenced to 30 months in...