Don't-Miss Stories

ear

Listen up: RSA keys snatched by recording CPU sounds with a phone

The co-inventor of the RSA algorithm has designed a scarily ingenious way of deciphering the unique sounds a CPU makes as it crunches RSA-encrypted content to extract the keys.

Vendor security patches lag dangerously, study suggests

Subscribers to organizations that sell exploits for flaws not yet known to software developers learn early about vulnerabilities in popular programs, a study says.

malware_piracy

Blackhole malware creator in custody, Russia confirms

Russian police have confirmed arrest of a man they believe to be the notorious "blackhole" hacker.

hacker hand

Hacker gets 18 months for peddling computer access to U.S. national security lab

The man offered to sell an undercover FBI agent entry to Lawrence Berkeley National Laboratory supercomputers.

hacker

Anatomy of a hack: Team meets a professor's challenge

An NYU professor challenged a team of hackers to break into his online world. They did, but it wasn't easy or cheap.

New website lets users check if their online credentials were exposed in hack attacks

The site combines email addresses corresponding to accounts exposed in data breaches at Adobe, Yahoo, Stratfor, Gawker and Sony

Two arrested in Germany for hacking computers they used to generate bitcoins

The suspects used malware to build a botnet, German police said.

Trojan program steals log-in credentials, other sensitive data from SAP client applications

A recently discovered malicious program steals log-in passwords and other sensitive information from SAP client applications and allows cybercriminals to access SAP servers from infected workstations.

Mining companies caught flat-footed by cyberattacks

Mining companies increasingly are being targeted by hackers trying to steal information and disrupt operations, as the metals industry expands its dependence on Internet-connected systems to reduce costs.

Anonymous spying on US government

A private FBI memo suggests that the hacktivist group may have compromised the security of several government agencies.