Utilities' cyber defense efforts said to be rapped by legislators, Congressional report finds
Malware and cybercrime - defense against hackers, viruses, trojans, botnets, cyberwar
Even the most innocuous security processes used for traditional IT systems could spell disaster in an ICS
The Trojan program adds a rogue PIN field to the Payza log-in page on infected computers, Trusteer researchers say
Cyber marauders sought more than just information on activists -- they wanted access to FBI, DOJ investigations on spies in the U.S.
New cyberespionage attack by People's Liberation Army prompts calls for action such as sanctions, but experts are mixed on best response
Security researchers uncovered an active large-scale cyberespionage operation of Indian origin that started several years ago
Mobile security expert Aaron Turner on the massive gap of knowledge among security managers when it comes to mobile security - both at home and abroad
Several new and persistent schemes have emerged for spreading malware on popular sites.