The automaker contends it only uses data for customer requests and to troubleshoot problems.
iSight describes the Trojan as sophisticated derivation of older point-of-sale malware.
Appeals court rejects company's petition for another hearing about its data-collection from neighborhood Wi-Fi networks while building Street View.
For the first time, hackers market stolen data with info on the location of store where card was used; experts say new strategy will slow detection.
Massachusetts Sen. Edward Markey is asking what carmakers are doing to prevent hacks of navigation, tire pressure, and braking systems.
Several advocacy groups are calling for an investigation into Internet companies Yahoo and Google whose networks were secretly accessed by the National Security Agency.
Facebook and Microsoft are winning plaudits from security researchers for launching an initiative to offer bounties to bug hunters.
In a rare move, a federal court in Idaho ordered a software developer's computer seized and its contents copied without prior notice because the developer described himself as a 'hacker' on his website.
By tinkering with the electrical properties of the silicon at the heart of chips, undetectable security vulnerabilities can be introduced at a hardware level.
A U.S appellate court's decision earlier this week to permit a wiretapping case against Google to proceed, is based on flawed reasoning, a leading technology think-tank says.
Though the National Security Agency spends billions of dollars to crack encryption technologies, security experts maintain that properly implemented, encryption is still the best way to maintain online privacy.
Less than two weeks after suffering a prolonged website outage, the New York Times was knocked offline again on Tuesday--apparently as the result of a malicious hacking attack.
Malware writers are ramping up their use of commercial file hosting sites and cloud services to distribute malware programs, security researchers said at this week's Black Hat conference here.
More secret NSA documents leaked by Edward Snowden suggest that the U.S. agency's British counterpart intercepts petabytes worth of communication data daily from fiber-optic cables.
Two secret documents describing the procedures the National Security Agency (NSA) is required to follow when spying on foreign terror suspects reveal the provisions that allow the agency to collect, retain and use information on U.S residents without a warrant, The Guardian newspaper reported today.
Articles by Jaikumar VijayanNext Page