Anonymous Reveals the Identity of Amanda Todd's Tormentor

Anonymous Reveals the Identity of Amanda Todd's Tormentor

Officials had known about Todd's photos being circulated online since one year ago

LulzSec’s Raynaldo Rivera Admits Hacking Sony Pictures

LulzSec’s Raynaldo Rivera Admits Hacking Sony Pictures

He pleaded guilty to conspiracy to cause damage to a protected computer

Saudi Aramco Blames Romanian Hackers for Attack on Its Networks

Saudi Aramco Blames Romanian Hackers for Attack on Its Networks

Sources close to the investigation claim that their devices have also been identified

Windows XP Is Three Times More Likely to Get Hacked Than Windows 7

Windows XP Is Three Times More Likely to Get Hacked Than Windows 7

Microsoft rolled out the new Security Intelligence Report Volume 13

Alleged Mastermind of Cybercriminal Project Against US Banks Shows His Face

Alleged Mastermind of Cybercriminal Project Against US Banks Shows His Face

The cybercriminal advertises an "insurance against prosecution" service

Philippines DOJ Claims to Have Identified Hackers Responsible for Defacing Sites

Philippines DOJ Claims to Have Identified Hackers Responsible for Defacing Sites

It's uncertain how many of them have been tracked down

TinKode Gets 2-Year Suspended Jail Term, Ordered to Pay $120,000 (€93,000)

TinKode Gets 2-Year Suspended Jail Term, Ordered to Pay $120,000 (€93,000)

The money will go to Oracle, NASA, the US Army and the Pentagon

iPhone 5 Vulnerable to Pwn2Own Winning Exploit by Joost Pol and Daan Keuper

iPhone 5 Vulnerable to Pwn2Own Winning Exploit by Joost Pol and Daan Keuper

A motivated hacker could steal contacts, browsing history, photos and videos

Man “Hacks” Bank of France by Mistake, Judge Lets Him Off the Hook

Man “Hacks” Bank of France by Mistake, Judge Lets Him Off the Hook

He just typed "123456" and he was inside the institution's servers

Peter the Great vs Sun Tzu: East Asian Hackers vs East European Hackers

Peter the Great vs Sun Tzu: East Asian Hackers vs East European Hackers

Trend Micro experts detail the differences between cybercriminals

  • Security
  • By Eduard Kovacs
  • September 17th, 2012
Philippines Introduces Cybercrime Prevention Law, Includes Controversial Libel Section

Philippines Introduces Cybercrime Prevention Law, Includes Controversial Libel Section

Critics of the legislation say that it will allow defamed politicians to sue bloggers

Bangladeshi Hackers Threaten US for Blasphemous Mohammed Video

Bangladeshi Hackers Threaten US for Blasphemous Mohammed Video

Bangladesh Grey Hat Hackers are preparing an attack

Dutch Hacker Develops Incredibly Energy-Efficient Computer

Dutch Hacker Develops Incredibly Energy-Efficient Computer

Power consumption is 5.9 watts when idle, 74.5 watts at full load

Epic Hacks of 2012: Fakes, False Rumors and Unfounded Threats

Epic Hacks of 2012: Fakes, False Rumors and Unfounded Threats

Here are the hacker attacks that made headlines, but turned out to be untrue

Mat Honan Interviews Cosmo the God

Mat Honan Interviews Cosmo the God

The 15-year-old talks about his life and his hacking methods

October 16: UK Authorities Decide If McKinnon Will Be Extradited to the US

October 16: UK Authorities Decide If McKinnon Will Be Extradited to the US

The UK Home Office will reveal its long-awaited verdict

  • Security
  • By Eduard Kovacs
  • September 10th, 2012
LulzSec Hacker Topiary Talks About Life Without Internet

LulzSec Hacker Topiary Talks About Life Without Internet

He claims that he has become a fulfilled individual

 
Want more? Browse: