The Silk Road online marketplace has resurfaced about a month after U.S. officials shut down the website that was only accessible through the Tor anonymity service, and arrested among others a man named Ross William Ulbricht, who was alleged to be the site's owner and operator.
The ongoing revelations of governmental electronic spying point to a problem larger than National Security Agency malfeasance, or even of security weaknesses. Rather the controversy arising from Edward Snowden's leaked documents suggest we face unresolved issues around data ownership, argued security expert Bruce Schneier.
Microsoft warned Tuesday that attackers are actively targetingA Windows Vista, as well asA Microsoft Office 2003 through 2010, with an attack that would give hackers the same rights as the victim.
"I've been involved with security awareness training for several years now, and I can't remember one single compliment on any of our previous courses," sighed Alex Yokley, Director of Corporate Information Security at Western Union.
It knows when you are sleeping. It knows when you're awake.
A coalition of defense lawyers, privacy advocates and journalists has sued the Dutch government over its collaboration and exchange of data with the U.S. National Security Agency and other foreign intelligence services.
The European Commission's Expert Groups, which play a vital role in shaping E.U. policies and legislation, are hugely dominated by corporate interests according to a new report released on Wednesday.
Confirming reports of limited attacks in South Asia and the Middle East, Microsoft released a security advisory on Tuesday warning of a new vulnerability targeting the TIFF image format.
Spear phishing is one of the most effective ways to break into a corporate network, and recent studies show that employees can be easily tricked on social media to provide the information needed to launch attacks.
New polling from the Digital Advertising Alliance (DAA) highlights the importance of guidelines to limit Web companies' online tracking.
Privacy International has filed complaints against U.K. telecommunications companies for assisting British intelligence agency Government Communications Headquarters (GCHQ) with mass interception of telephone and Internet traffic that passes through undersea fiber optic cables.
Microsoft on Monday expanded its $100,000 bounty program, and will accept reports of in-the-wild attacks that demonstrate new techniques of bypassing Windows' anti-exploit technologies.
It is not possible to build the perfect security perimeter. But that doesn't mean you shouldn't try.
Microsoft today said that attackers are exploiting a critical and unpatched vulnerability in Office 2007 using malformed documents to hijack Windows PCs and said Office 2003 and Office 2010 are also vulnerable.
Google has begun work on shutting a hole in its Chrome browser that lets casual thieves steal website and Web service passwords.
A significant increase this weekend in TCP traffic with source port zero detected could be part of reconnaissance efforts in preparation for more serious attacks, according to security researchers from Cisco Systems.
Bitcoin is vulnerable to an attack that could have devastating effects on the virtual currency, but it can be fixed with a software update, according to researchers from Cornell University.
The creators of CryptoLocker, a piece of malware that encrypts user data and holds it for ransom, are giving users who removed the malicious program from their computers a second chance to recover their files, but at a much higher cost.
We just found 30 servers that can't be accounted for. Thirty Internet-facing servers with no malware protection and patchy patch histories. I need to take a deep breath and figure out just how bad this is and what we can do to stop this sort of thing from happening again.
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.