Don't-Miss Stories

Social Engineering: 3 Examples of Human Hacking

Chris Hadnagy gets paid to fool people, and he's gotten pretty good at it over the years. A co-founder of and author of Social Engineering: The Art of Human Hacking, Hadnagy has been using manipulation tactics for more than a decade to show clients how criminals get inside information.

Senators Propose Bill to Protect Airport Body Scan Images

Two U.S. Senators today proposed a law that would prohibit the distribution or photographing of body images created by TSA scanners in airports.

What Security Technology Will Be Hot at RSA 2011?

The annual RSA Conference, now in its 20th year, will be rocking this month as the security industry gathers in the weeklong extravaganza of product introductions and security experts arguing cloud and mobile computing security issues.

Plant Sentinels Sniff Out Danger, Turn White at the First Sign of Trouble

Genetically-modified plants change color in the presence of potentially dangerous chemicals, creating an organic early warning system that looks good and smells even better.


Three Fired for Accessing Records of Tucson Shooting Victims

Three employees at Tucson's University Medical Center have been fired for improperly accessing victims' medical records.

Microsoft BPOS Cloud Service Hit With Data Breach

A 'small number' of Offline Address Book users had some of their data accessed

Holiday Security: Even If You Don't Drink and Drive Your Keyboard This Weekend

Some security tips, whether you plan on drinking and typing or not.

Teen Gang Admit Huge Zeus Trojan Fraud

A gang of British teens has admitted to stealing and marketing credit card numbers and bank details worth an estimated $18 million.

What It's Like to Steal Someone's Identity

Think you have nothing worth stealing? Think again.

Using Stolen SSN Isn't Criminal Impersonation, Court Says

Colorado justices play legal Twister to overturn conviction