Cyberspace is becoming a new battleground for the US and China, amid growing concerns about Chinese industrial espionage through various types of computer worms, security professionals claim.
Congress is considering forcing states to use data brokers to help screen applicants for commercial drivers' licenses, a potentially lucrative development for an industry under scrutiny for how it handles personal information.
The Federal Deposit Insurance Corp. (FDIC) today issued a list of best practices for financial services firms that details how to protect against spyware, which the agency said can be used by criminals to collect customer data or hack into banking systems.
The Transportation Security Administration violated privacy protections by secretly collecting personal information on at least 250,000 people, congressional investigators said Friday.
University of Colorado students and employees were warned of possible fraud and identity theft after hackers hit two of the school`s computer servers.
The deluge of spam that pours into email inboxes each day could by curtailed using software that learns to identify the routes taken by unwanted messages, researchers say.
Spanish police have carried out a mass raid on email scammers, arresting over 300 people at 166 locations.
"We've received reports that the color management module ICC profile buffer overflow vulnerability has exploit code available and is being used out in the wild," ISC said on its Web site.
Elite ex-hacker Kevin Mitnick says most of the social engineering attacks using fraudulent identities that made him famous could have been stopped if his targets had just asked for his phone number.
Visa USA said yesterday that it would stop allowing the payment processor CardSystems Solutions to handle its transactions, months after the processor left the records of millions of cardholders at risk for fraud.
NIST has released a draft version of the minimal security requirements for federal agencies after government auditors found that the agencies are not prepared to deal with internet menaces.
"It`s increasingly clear that the government is involved in political surveillance of organizations that are involved in nothing more than lawful First Amendment activities."
Your Internet service provider isn't to blame if your company is hit with a distributed denial-of-service attack. That was the verdict of IT security professionals in a mock trial staged by Gartner.
After enjoying phenomenal growth in its first 10 years, Internet commerce faces new challenges amid growing fears of viruses, spyware and a range of fraud schemes.
Google is at once a powerful search engine and a growing e-mail provider. It runs a blogging service, makes software to speed Web traffic and has ambitions to become a digital library. And it is developing a payments service. "This is a lot of personal information in a single basket."
On a recent Sunday morning when Lew Tucker's Dell desktop computer was overrun by spyware and adware, he did not simply get rid of the offending programs. He threw out the whole computer.
Dell has rejected allegations that its PCs come pre-loaded with an intrusive application that spies on users' surfing habits.
In a study of 791 users commissioned by antispam firm Mirapoint, market research firm The Radicati Group found that the most received scams were prescription drug offers, financing services, phishing e-mails and pornography.
The ICANN committee recommended 10 fixes for hijacking, which ranged from more public awareness and a domain-name emergency hotline to potentially stricter verification of the identity of domain-name holders and better record keeping of registrations.
The flaws could allow an online intruder to crash or gain access to computers running Kerberos, a freely available authentication technology that was developed by the Massachusetts Institute of Technology. Both bugs affect Kerberos 5 Release 1.4.1 as well as earlier versions, according to MIT.