Image from Shutterstock.com

SQL injection attacks can be stopped, says security expert

One of the oldest ways of attacking an SQL database is still successfully being exploited by criminals to gain access...

August 7th, 2014 Howard Solomon

Hacker steals e-mail addresses, demands Astley tune

Hacker steals e-mail addresses, demands Astley tune

Dutch hacker Darkc0ke hijacked a radio station database containing 22,000 e-mail addresses and threatened to publish them unless the station...

May 19th, 2010 loek essers

Heartland and TJX hacker pleads guilty in third case

Heartland and TJX hacker pleads guilty in third case

The hacker who enabled the theft of millions of credit card numbers from Heartland Payment Systems Inc. (NYSE: HPY), TJX...

December 30th, 2009 Nancy Gohring

One in five Web attacks aimed at Facebook, other social nets

One in five Web attacks aimed at Facebook, other social nets

One in five online attacks are aimed at social networks,  such as Facebook, says Nebulas Solutions Group.   The security firm's...

August 20th, 2009 Carrie-Ann Skinner

Obama campaign hopes for better Web security

Obama campaign hopes for better Web security

Two months after their Web site was hacked, the organizers of Barack Obama's presidential campaign are looking for a network...

June 13th, 2008 Robert McMillan

Researchers expose RFID security holes

Researchers expose RFID security holes

University researchers in Amsterdam have discovered a way to plant a virus on radio frequency identification (RFID) tags, potentially infecting...

April 13th, 2006 Mari-Len De Guzman

BLACK HAT: Google now a hacker’s tool

BLACK HAT: Google now a hacker’s tool

Somewhere out on the Internet, an Electric Bong may be in danger. The threat: a well-crafted Google query that could...

August 2nd, 2005 Robert McMillan

securing your web apps

securing your web apps

Given that corporate security is only as good as its weakest link, Web applications — arguably the weakest link —...

May 13th, 2004 Chris Conrath