When Facebook Gets Hacked, Everyone Gets Hacked Facebook's attackers may have gained access to several third-party apps and websites via Facebook Login.
Inside the North Korean Hacking Operation Behind SWIFT Bank Attacks FireEye details how this money-stealing operation it now calls APT 38 has emerged in the past four years and how it operates.
Stop Saying 'Digital Pearl Harbor' Yes, there are serious dangers posed by malevolent nation-states. But the hype is distracting us from the reality of the threats.
Owning Security in the Industrial Internet of Things Why IIoT leaders from both information technology and line-of-business operations need to join forces to develop robust cybersecurity techniques that go beyond reflexive patching.
'Torii' Breaks New Ground For IoT Malware Stealth, persistence mechanism and ability to infect a wide swath of devices make malware dangerous and very different from the usual Mirai knockoffs, Avast says.
'Short, Brutal Lives': Life Expectancy for Malicious Domains Using a cooling-off period for domain names can help catch those registered by known bad actors.