FBI investigating ‘Here you have’ worm

FBI investigating ‘Here you have’ worm

The FBI has launched an investigation into the "Here you have" worm, which disrupted corporate e-mail systems in the U.S....

September 24th, 2010 Robert McMillan

Twitter settles FTC privacy complaint

Twitter settles FTC privacy complaint

Social-networking giant Twitter Inc. has agreed to settle a complaint from the U.S. Federal Trade Commission alleging that the company...

June 24th, 2010 Grant Gross

Jury convicts Palin e-mail hacker

Jury convicts Palin e-mail hacker

After four days of deliberation, a federal jury convicted 22-year-old David C. Kernell of two charges stemming from a 2008...

May 4th, 2010 Gregg Keizer

PhoneSnoop

PhoneSnoop

The creator of PhoneSnoop, a proof-of-concept application that turns a BlackBerry into a listening device for a hacker on the...

October 29th, 2009 Kathleen Lau

BlackBerry, other smart phone users easy spy targets

BlackBerry, other smart phone users easy spy targets

KUALA LUMPUR — IPhone lovers and other smart phone users should take heed: A security researcher showed ways to spy...

October 7th, 2009 Dan Nystedt

Clerity MMAP methodology eases mainframe migrations

Clerity MMAP methodology eases mainframe migrations

Clerity Solutions Inc.has announced a consulting service designed to help organizations tackle the stumbling blocks often associated with mainframe migrations....

September 14th, 2009 Kathleen Lau

Instant messaging accelerates data theft

Instant messaging accelerates data theft

One of the more sophisticated pieces of malware in circulation has been given an upgrade that lets cybercriminals act even...

September 2nd, 2009 Jeremy Kirk

Mafiaboy speech a standing room only affair

Mafiaboy speech a standing room only affair

Attending IT360 last week didn’t guarantee you a seat at Michael Calce’s keynote with Craig Silverman. The conference room reached...

April 8th, 2009 Jennifer Kavur

Hackers update Conficker worm, evade countermeasures

Hackers update Conficker worm, evade countermeasures

Computers infected with the Conficker worm are being updated with a new variant that sidesteps an industry effort to sever...

March 11th, 2009 Gregg Keizer