Savvy Internet users know that downloading unsolicited computer programs is one of the most dangerous things you can do online. It puts you at great risk for a virus or another time bomb from a hacker.
A link in an e-mail from a Facebook user leads to a Web site that appears to hold a video and prompts users to update the computer's software to see the video. The "upgrade" is actually the virus being installed.
A federal judge Tuesday lifted a gag order on three MIT students who were barred from talking publicly about security flaws they discovered in the state's automated mass transit fare system, even as a lawyer for the agency acknowledged the system was "compromised."
A giant vulnerability in the Internet's design is allowing criminals to silently redirect traffic to Web sites under their control. The problem is being fixed, but its extent remains unknown and many people are still at risk.
Prosecutors say Robert Soloway spent years sending tens of millions of junk e-mail messages using networks of compromised computers. When his sentence was announced, Soloway simply smiled, because prosecutors had asked for nine years.
Before your next party, go ahead and consult the latest edition of Merriam-Webster's Collegiate Dictionary, which now includes edamame (immature green soybeans), pescatarian (a vegetarian who eats fish) and about 100 other newly added words that...
Attackers could gain control of water treatment plants, natural gas pipelines and other critical utilities because of a vulnerability in the software that runs some of those facilities, security researchers reported Wednesday.
The proposal Col. Charles Williamson III outlined in the May edition of the Armed Forces Journal highlights the creative cyberwarfare strategies being hashed out by the military as hackers abroad step up their attacks on U.S. government computer networks.