As a 19-year-old college student In 2006, Mitchell Frost used a campus network to launch botnets against several conservative web sites; here is his story.
Hacking has been around for decades, starting with curiosity-driven systems break-ins. Today's crimes are often financially-motivated fraud. Here are ten hacking incidents that made history.
When the scam is happening to someone else, it can make for great cinema. Here are seven of our favorites.
Hosting service CloudFlare shares details of the "intense" experience of fielding attacks on the hacking site.
Some of the images include a Photoshopped picture of Justin Bieber in a pornographic situation and a bloodied, dead dog.
Which tactic works best for a scamming social engineer?
Among large companies, the average security budget is $3.35 million.
You may now be savvy enough to know that when a friend reaches out on Facebook and says they've been mugged in London and need cash, that it's a scam. But social engineers are one step ahead of you.
While 69 percent of organizations have employees using personal devices to connect to their corporate network, more than one-fifth, or 21 percent, currently have no policy in place to govern the use of personal mobile devices on their network.
A survey of more than 3,400 employees in the United States, Great Britain and Australia finds corporate loyalty be damned, your company's data may be on its way out the door when certain employees resign or get laid off.
Social engineers fool unsuspecting by pretending to be old friends or trusted authorities on email and social networks.
IT managers are slowly embracing the growing number of consumer devices such as iPhones and iPads in the workplace. But that doesn't mean they're ready.
A con job on the microblogging site promises to increase a user's followers, but actually steals the account.
As more people create Facebook profiles (500 million and growing), and sign on other social media sites, hiring managers find new ways to vet prospective employees.
John Burke of Nemertes Research says while organizations are hot for virtualization technology, they are ignoring security in the rush to adopt
Articles by Joan GoodchildNext Page