IBM Can Help Apple’s Trust Issues but Blackberry Could Steal Share
By Rob Enderle | Article Published September 03, 2014
The nude celeb hacking scandal suggests that Apple could use IBM’s help.
Tags: IBM, Apple, hacking, BlackBerry Apps
Five Charged in Largest Ever Hacking Scheme
By Cynthia Harvey | Article Published July 26, 2013
The men allegedly stole 160 million credit card numbers.
Tags: SQL injection, hacking, hacker, hack attacks, Russian
Report: Twitter Testing Two-Factor Authentication
By Cynthia Harvey | Article Published April 24, 2013
A high-profile hack on the AP Twitter feed is prompting a closer look at security.
Tags: Twitter, social media, hacking, two-factor authentication
Report: Most Cyberespionage Originates in China
By Cynthia Harvey | Article Published April 23, 2013
A new Verizon report shows that all businesses are in danger of cyberattacks.
Tags: China, hacking, Verizon, cyberattack, report, cyber espionage
Report: U.S. May Escalate Response to Chinese Cyberespionage
By Cynthia Harvey | Article Published April 22, 2013
The Obama administration is said to be considering sanctions or even cyberattacks of its own.
Tags: China, State Department, hacking, cyberattack, cyber espionage, U.S.
Hackers Resume Attacks on U.S. Banks
By Cynthia Harvey | Article Published March 13, 2013
A DDoS attack temporarily blocked access to Chase's website.
Tags: hackers, hacking, cyberattack, bank
China Calls for Cyberespionage Rules
By Cynthia Harvey | Article Published March 11, 2013
The country, often accused of cyber spying, says it is frequently a victim of cyberattacks, including many that originate in the U.S.
Tags: China, hacking, cyberattack, cyber espionage
China Accuses U.S. of Hacking Military Sites
By Cynthia Harvey | Article Published February 28, 2013
Tensions build as both countries accuse each other of cyberattacks.
Tags: China, hacking, cyberattack, military, hack attacks, U.S.
Industrial Hacking Isn’t Just Made In China
By Mike Elgan | Article Published February 20, 2013
Suddenly, everybody's doing it. And if Google executive Eric Schmidt is right, honest companies don't stand a chance.
Tags: security, Twitter, hacking
Hacking Experts Find New Ways to Attack Android Phones
By Datamation.com Staff | Article Published July 26, 2012
A researcher shows off an NFC-based attack at the Black Hat conference.
Tags: security, Google, Android, hacking, NFC, Black Hat Conference, near-field communications
Yahoo Passwords Hacked, Likely Taken Through Yahoo Voices
By Datamation.com Staff | Article Published July 12, 2012
Hackers from D33D Company posted usernames and passwords for 435,000 Yahoo accounts.
Tags: security, hackers, Yahoo, hacking, password
Russia Takes Top Hacking Honors, U.S. Lags
By Sean Michael Kerner | Article Published April 27, 2011
Russia produces more hacking attacks than anywhere, while America falls a few spots in this dubious honor roll.
Tags: security, cybersecurity, network security, hacking, cyberattack
Vietnam Denies Google's Hacking Charges
By Kenneth Corbin | Article Published April 06, 2010
Stern rebuttal follows claims from Google and security player McAfee that hackers with government ties targeted activist bloggers with malware.
Tags: Google, China, cyber attacks, malware, hacking
Inside a Global Cybercrime Ring
By - Reuters | Article Published March 25, 2010
As business boomed, the firm added a human resources department, hired an internal IT staff and built a call center to dissuade its victims from seeking credit card refunds.
Tags: security, Security Software, hacking, cyber crime, Secure data
China Says Google Never Filed Complaint in Hacking Case
By Kenneth Corbin | Article Published March 08, 2010
Confusion continues to muddle the Google/China saga, with Chinese officials saying they aren't -- and are -- in talks with Google about hacking and censorship allegations.
Tags: security, Google, cyber security, hacking, Internet censorship