Embassy leaks highlight pitfalls of Tor
The security researcher that posted the e-mail addresses and passwords for 100 accounts at embassies and political groups reveals that he exploited the victims' incorrect usage of the Tor Project's anonymous Web surfing software.
China on hot seat over alleged hacks
Twice in two weeks, the nation has been taken to task for breaching other nations' systems, but officials continue to deny the accusations.
Fraudsters focus on job sites
A Trojan horse mines Monster.com for personal details that could make fraudulent e-mail schemes more convincing, while evidence mounts that other job sites are also being attacked.
Universities warned of Storm Worm attacks
Scanning a computer infected with the bot software could bring swift retribution, warns the response center for academic networks.
Retro attack gets new life, worries browser makers
Researchers find that browsers and plug-ins could be exploited to turn a victim's computer into a door to the internal network. One study finds an attack could claim 100,000 IP addresses in three days.
Teaching hacking helps students, professors say
Universities and colleges could find more students interested in computer-science courses, if the teachers taught practical hacking, educators say.
Will the iPhone be iPwned?
Security experts' predictions for the sleek high-end device vary, but they agree that Apple's first phone will be scrutinized closely.
Firm finds new danger in dangling pointers
The common software flaw should be considered a security threat, not a quality control issue, researchers say.
Newsmaker: DCT, MPack developer
One of the three Russian developers behind the MPack infection kit virtually sits down with SecurityFocus to discuss the program and making a business out of cybercrime.
Spammers dump images, switch to PDF files
A wave of spam e-mail messages carrying attachments in the Portable Document Format gathers speed, hitting companies and consumers worldwide.