The Sony PlayStation Network data breach that exposed personal and password information -- and possibly credit cards -- of an estimated 77 million people is already considered one of tech history's worst security failures.
The massive Sony PlayStation Network data breach that exposed personal and password information -- and possibly credit cards -- of an estimated 77 million people is an identity-theft bonanza.
The general responsible for investigating the Stuxnet attack on Iran's nuclear program says that the country was also hit by a second targeted attack, called Stars.
Anonymous -- the group credited with taking down security vendor HBGary Federal and defending WikiLeaks by attacking websites of its perceived enemies -- says it has nothing to do with the network trouble crippling Sony's PlayStation site, despite ha...
Seattle police are investigating a group of criminals who they say have been cruising around town in a black Mercedes stealing credit card data by tapping into wireless networks belonging to area businesses.
A Georgia man connected to US$36.6 million in credit card fraud pleaded guilty Thursday to trafficking in counterfeit credit cards and aggravated identity theft, the U.S. Department of Justice said.
A German software company known for its Windows utilities is warning customers to be on the alert for malicious e-mail messages after its servers were hacked.
Verizon's just-released "2011 Data Breach Investigations Report" says businesses could prevent most data breaches if they stick to security principles that are cheap and easy to implement.
Criminals carried out more but smaller data thefts last year than in previous years, indicating a shift toward simpler exploits that run lower risk of punishment, according to Verizon's latest data breach report.
When Google admitted last year that it had been targeted by sophisticated hackers, possibly from China, it introduced a new term into the high technology lexicon -- the advanced persistent threat. These attacks are sophisticated, targeted, and almost...
An anonymous hacker who claimed to have broken into monitoring systems at a New Mexico wind turbine facility made the whole thing up, security experts said Monday.
One day after a hacker posted screen shots and data to a hacking mailing list, saying he had broken into a New Mexico wind turbine facility, the company that runs the turbines says it has seen no evidence of a computer intrusion.
Claiming revenge for an "illegitimate firing," someone has posted screenshots and other data, apparently showing that he was able to break a 200 megawat wind turbine system owned by NextEra Energy Resources, a subsidiary of Florida Power & Light.
A new week, a new rash of attacks against security vendors, email marketers and banks. It would be easy to point fingers and laugh at the irony, especially in the case of security vendors, but that would be both petty and shortsighted.
The U.S. Department of Justice and U.S. Federal Bureau of Investigation have obtained a temporary restraining order allowing them to disrupt a computer virus that created an international botnet controlling more than 2.3 million computers as of early...
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Synology DS216+ Review
- 3 Review: TCL C1 series 4K TV
- 4 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 5 LG 55EG960T OLED UHD TV
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Surprise! Nvidia reveals a new Pascal-powered Titan X and it looks like an utter monster
- Apple faces lawsuit over AppleCare refurbished devices not being new
- Intel experiments with 3D Xpoint as it ships out SSDs to testers
- Edward Snowden has developed an iPhone case meant to kill surveillance
- Tesla wants to end fossil fuel use, make self-driving cars 10X safer
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTSocial Media AssistantQLD
- FTDesktop EngineerNSW
- FTGraduate IT supportNSW
- CCSAP MM / Ariba Functional ConsultantNSW
- CCInfrastructure Project ManagerACT
- FTMobile DeveloperWA
- CCDesktop Engineer (SCCM/SOE)WA
- CCMiddleware ConsultantVIC
- CCSQL DeveloperNSW
- CCContract Analyst Programmer (JAVA/Oracle) 160728/AP/623Asia
- CCInformation Management Project Manager (SAP BI)NSW
- CCReport Business Analyst- BI, Oracle, SAP, TableauNSW
- CCAgile Scrum MasterACT
- FTContinuous delivery application deployment automation specialist (DevOps)NSW
- FTService Desk AnalystNSW
- CCOrganisational Change ManagerVIC
- FTFull stack (back end focus) Java Developer | Defence | NV1ACT
- FTJava DeveloperVIC
- CCIncident ManagerSA
- CCProject Manager- Infrastructure and App Roles- Gov BackgroundNSW
- CC.Net Developer Application DesignerACT
- CCContract Analyst Programmer (J2EE) 160721/AP/075Asia
- CCUX / UI Visual DesignerNSW
- CCIT Business Analyst- Infrastructure, BABOK- Government BackgrndNSW
- CCPractice Lead - Java, FrontendVIC