When you think teenage hacker, you typically think of a troublemaker changing his grades or defacing Websites. But a 16-year-old U.K. student recently earned the distinction of becoming the world's ...
It's easy to set up a cybercriminal operation these days. But not all crooks are cut out for this game, some ending up not just infecting their own computers but also leaving identifying evidence on ...
For the second time this year, script kiddies using old tactics are bolstering their egos in the name of their countries. While Israeli and Palestinian hackers continue to duke it out in cyberspace, a ...
Marc Maiffret knew it was time to grow up when he awoke one morning in 1998 to an FBI agent holding a gun to his head. "All that hacking had caught up with me," says Maiffret, CTO and chief hacking ...
The UK's data protection watchdog says more than half of cyberattacks in schools are caused by students, and that parents should act early to prevent their offspring from falling into the wrong crowds ...
This year’s Black Hat and Def Con Internet security conferences appeared more professional than in previous years, with more security professionals and government officials in attendance. But one ...
Cybersecurity researchers have discovered a new campaign attributed to the Chinese "Tropic Trooper" hacking group, which employs a novel loader called Nimbda and a new variant of the Yahoyah trojan.
The world of information security and cyber security is often portrayed as deeply technical, focused on repelling the “hooded hacker”. This can do one of two things to an organisation’s user community ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results