A single email wiped $300 million off the value of an Australian mining company, after an environmental activist, Jonathan Moylan and sent a press release to media organizations.
Victims of the notorious attack against Sony’s online gaming service and associated websites in 2011, which exposed details for up to 77 million subscribers, are to be offered $15m in digital goods as compensation.
Using free cloud application hosting can allow an attacker to create a “free supercomputer” according to The Register's report - used to mine cryptocurrency, researcher Oscar Salazar warns.
Ebay’s online ticket resale service Stubhub fell victim to a cyber-scam where a “global gang” used 1,600 hacked accounts on the service and bought and resold tickets, laundering $1m through European banks.
Account hackers and thieves who loot magic weapons, armor and hard-won game currency from players in massively multiplayer titles such as World of Warcraft should face the same sentences as real-world thieves, a politician has suggested.
Tesla’s Model S has been hacked to make the doors and sun roof open while the car is in motion - and the researchers behind the attack were able to control the systems remotely.
‘Sextortion’ attacks where cybercriminals blackmail victims with the threat of exposing explicit photographs or messages are increasingly common, according to a report by Bloomberg News.
Disgruntled employees and other malicious insiders could be one of the most serious security threats companies face - but the importance of the threat from the ‘enemy within’ varies according to who you ask.
Thinking of spending some time perusing Japanese porn websites before you do your online banking? Security researchers at ESET have analysed an organised malware campaign that stole the login credentials of online banking customers after infecting PCs that had visited X-rated websites.
Win32/Aibatook targets Japanese bank customers with an unusual Internet Explorer monitoring technique. We believe the malware has been in development for months - and is now ready for take-off.
Popular technology news and review website CNET faced the threat of having a million users' data exposed this week, with an unknown attacker posting screenshots of data from a CNET server, and demanding a surprisingly small ransom…
Data breaches have hit a record high in the state of New York, tripling since 2006, according to records released by the state attorney general.
“Phishing attack ahead” is similar to the stark, clear warnings delivered by road signs - and web users will soon benefit from this sort of plain-speaking alert, at least when using Google’s Chrome browser.
Guests who used business centers in American hotels may be at risk from gangs installing keylogger malware on the computers to steal banking and email passwords.
A notorious strain of banking malware, known as Caphaw - or Shylock, due to snippets of Shakespeare’s Merchant of Venice embedded in its code - has seen its command and control servers shut down in a major international police operation.
Nigeria’s notorious fraud industry has expanded overseas - with Nigerian conmen entering Malaysia on student visas to perpetrate fraud using the country’s fast connections and advanced banking system, and raking in millions of dollars.
New ‘slimline’ ATM skimmers are proving far harder to spot - with some of the hi-tech models remaining in place for up to five days before banks are alerted, and equipped with hi-tech extras such as cameras to spy on users' PIN codes.
A high-profile ‘connected’ lighting system had a critical vulnerability which allowed attackers to take control of the entire system, switching off light bulbs at will, and which could be executed by criminals within 100 feet of a home.
Top police cybercrime experts from 22 European countries are to participate in a 10-day intensive training course in Spain starting this week - becoming, in the words of the head of the European Cybercrime Centre, ‘cyber cops’.
Banking malware built to misdirect a Brazilian form of bank payment method targeted $3.75 billion of transactions over the past two years - and the scale of the attack may have eclipsed any single previous instance of electronic theft.