Cybercrime
-
Companies can spend millions on cyber security but still see sensitive data dumped on internet; the only full protection is to shut down business
-
-
Women’s clothing chain ‘moved quickly to block attack’ in which cardholder names, account numbers and verification codes may have been exposed
-
Police find equipment capable of infiltrating bank accounts and cash machines in raids on homes in upmarket area of Nairobi
-
Pyongyang not behind cyber-attack that led to leak of several unreleased movies, says diplomat in New York
-
Experts say there is little hard evidence to point to Pyongyang, but secretive state appears happy to stay on list of suspects
-
Sony Corp targeted by hackers last week in first US large-scale malware attack, say cybersecurity experts
-
Attacks on email accounts have compromised data from more than 100 publicly held companies, according to cybersecurity company FireEye
-
Officers at 84 airports have arrested scores of people implicated in global crime rings, targeting sites that sell stolen and fake credit card details
-
Retailers and consumers must be vigilant about cyber threats, otherwise they risk a crash on the busiest online shopping day
-
William Gibson ‘had so very little idea of how to write a novel’ when he was commissioned to come up with a manuscript
-
Alan Travis: Outrageous claims by the intelligence and security committee threaten goodwill that exists among internet firms and UK police
-
-
17-year agency veteran Jim Penrose, speaking at the Cyber Security Summit 2014 in New York
-
‘Usual suspects’ Russia and China thought to be in the clear as attention focuses on US, UK and Israeli agencies
-
‘Nation state’ most likely behind development of stealth malware Regin, say antivirus experts
-
Better for your lungs, worse for your hard drives, e-cigarettes can potentially infect a computer if plugged in to charge
-
Search warrant issued for 19-year-old in European-wide crackdown on remote access trojans
-
Security firm Bitdefender says more than 200,000 people have fallen for the ‘Like-farming’ ploy, complete with malicious videos
-
White supremacists were blocked from sending abuse to Luciana Berger, but the reason was anti-spam tools, the site claims. By Alex Hern
-
Official says classified systems have not been compromised by latest in series of cyber-security breaches in US government
-
-
OnionDuke malware linked to MiniDuke hacker tools, which are thought to have been used to target Nato and European governments. By Tom Fox-Brewster
-
There are a startling number of legal and free tools that let anyone set up NSA-esque operations – or just infiltrate the neighbour’s webcam. By Tom Fox-Brewster
-
The co-ordinated raids on dark-web sites may have come about because of flaws in the anonymous browser. By Alex Hern
-
Reports show that hacking and cybercrime swamp federal agencies as US struggles to keep pace with international groups of hackers
-
Employees’ personal information may have been compromised as well as data about customer care callers between January and August
-
A new vocabulary for a transformed reality: the deeply influential cyberpunk classic, 30 years on from its original publication. By John Mullan
-
Home improvement retailer says hackers gained access to emails in addition to payment card data during five-month breach earlier this year
-
Theoretical vulnerabilities mean that a ‘cyber bomb’ could be possible, yet attacks are limited in their scope and extremely complex to carry out. By Tom Fox-Brewster
-
From attackers trying to bring down planes to criminals targeting banks, the danger is growing
-
Pew Research report’s survey finds 61% of respondents predicting at least one attack causing ‘widespread harm’. By Stuart Dredge
-
The Guardian tech team discuss the dark net, Reddit's R/Nosleep, the latest Bitcoin crisis and why Elon Musk says AI is dangerous
-
Hacker group believed to have attacked governments in Georgia, the Caucasus and eastern Europe, as well as Nato. By Tom Fox-Brewster
-
Malicious PowerPoint documents launch exploit code on target PCs when opened, but could have used any Microsoft Office file. By Tom Fox-Brewster
-
Security firm warning over DarkComet Remote Access Trojan, although campaign is not ‘widespread’ yet. By Stuart Dredge
Only a cyber ‘arms control’ treaty can keep online criminals and terrorists at bay