How did what is likely to be one of the largest data breaches in history occur? Some speculate it was only possible with insider knowledge.
The co-inventor of the RSA algorithm has designed a scarily ingenious way of deciphering the unique sounds a CPU makes as it crunches RSA-encrypted content to extract the keys.
Subscribers to organizations that sell exploits for flaws not yet known to software developers learn early about vulnerabilities in popular programs, a study says.
Russian police have confirmed arrest of a man they believe to be the notorious "blackhole" hacker.
The man offered to sell an undercover FBI agent entry to Lawrence Berkeley National Laboratory supercomputers.
An NYU professor challenged a team of hackers to break into his online world. They did, but it wasn't easy or cheap.
The site combines email addresses corresponding to accounts exposed in data breaches at Adobe, Yahoo, Stratfor, Gawker and Sony
The suspects used malware to build a botnet, German police said.
A recently discovered malicious program steals log-in passwords and other sensitive information from SAP client applications and allows cybercriminals to access SAP servers from infected workstations.
Mining companies increasingly are being targeted by hackers trying to steal information and disrupt operations, as the metals industry expands its dependence on Internet-connected systems to reduce costs.