Anti-spyware bill could mean tougher fines
Supporters of the Spy Act, which heightens civil penalties against those responsible for programs that hijack PCs and collect data without adequate authorization, hope that the bill's third time is a charm.
Phisher 'Vladuz' dodges eBay's defenses
A malicious hacker has seemingly gained unauthorized access to parts of eBay's network for the third time in as many months, despite the best efforts of the company's security team.
eBay goes hacker hunting in Romania
More than two months after breaching eBay's employee servers, a hacker who calls himself Vladuz continues to dodge the online auctioneer's security team and U.S. and European authorities.
Tor hack proposed to catch criminals
A security researcher unveils a project that aims to identify sources on the pro-privacy network, but does the initiative help track down criminals or just hurt legitimate users?
Stormy weather for malware defenses
The misnamed Storm Worm, actually a Trojan horse, underscores the difficulties that evolving tactics pose for defenders. The second article in a two-part series.
Maynor reveals missing Apple flaws
Security researcher David Maynor shows off the code for exploiting a vulnerability in the native Mac OS X wireless drivers revealed last summer as well as e-mails showing he notified Apple.
Legal threats scuttle RFID flaw demo
Security technology giant HID uses patent claims to silence a security researcher scheduled to detail issues in radio-frequency identification (RFID) technology at a conference this week.
Google Desktop flaw allows data theft
Imperfect Storm aids spammers
The misnamed Storm Worm, actually a Trojan horse, underscores the evolution of spammers' tactics, including massive attacks on their critics and competitors. The first article in a two-part series.
U.S. calls for more organized cyber response
Federal officials renew calls for the private sector to help manage threats to critical infrastructure and the Internet.