iSight describes the Trojan as sophisticated derivation of older point-of-sale malware.
Appeals court rejects company's petition for another hearing about its data-collection from neighborhood Wi-Fi networks while building Street View.
For the first time, hackers market stolen data with info on the location of store where card was used; experts say new strategy will slow detection.
Several advocacy groups are calling for an investigation into Internet companies Yahoo and Google whose networks were secretly accessed by the National Security Agency.
Facebook and Microsoft are winning plaudits from security researchers for launching an initiative to offer bounties to bug hunters.
In a rare move, a federal court in Idaho ordered a software developer's computer seized and its contents copied without prior notice because the developer described himself as a 'hacker' on his website.
By tinkering with the electrical properties of the silicon at the heart of chips, undetectable security vulnerabilities can be introduced at a hardware level.
A U.S appellate court's decision earlier this week to permit a wiretapping case against Google to proceed, is based on flawed reasoning, a leading technology think-tank says.
Though the National Security Agency spends billions of dollars to crack encryption technologies, security experts maintain that properly implemented, encryption is still the best way to maintain online privacy.
Less than two weeks after suffering a prolonged website outage, the New York Times was knocked offline again on Tuesday--apparently as the result of a malicious hacking attack.
Malware writers are ramping up their use of commercial file hosting sites and cloud services to distribute malware programs, security researchers said at this week's Black Hat conference here.
More secret NSA documents leaked by Edward Snowden suggest that the U.S. agency's British counterpart intercepts petabytes worth of communication data daily from fiber-optic cables.
Two secret documents describing the procedures the National Security Agency (NSA) is required to follow when spying on foreign terror suspects reveal the provisions that allow the agency to collect, retain and use information on U.S residents without a warrant, The Guardian newspaper reported today.
U.S. companies should be allowed to take aggressive countermeasures against hackers seeking to steal their intellectual property, contends the private Commission on the Theft of American Intellectual Property.
Key lawmakers are suggesting that the controversial Cyber Intelligence Sharing and Protection Act, better known as CISPA, will soon die in the U.S. Senate -- just like last year.
Articles by Jaikumar VijayanNext Page