Account pretexters plague Xbox Live
An increasing number of players on Microsoft's gaming system claim their accounts have been stolen by teams of cheaters looking for further advantage.
Anti-spyware bill could mean tougher fines
Supporters of the Spy Act, which heightens civil penalties against those responsible for programs that hijack PCs and collect data without adequate authorization, hope that the bill's third time is a charm.
Tor hack proposed to catch criminals
A security researcher unveils a project that aims to identify sources on the pro-privacy network, but does the initiative help track down criminals or just hurt legitimate users?
Stormy weather for malware defenses
The misnamed Storm Worm, actually a Trojan horse, underscores the difficulties that evolving tactics pose for defenders. The second article in a two-part series.
Maynor reveals missing Apple flaws
Security researcher David Maynor shows off the code for exploiting a vulnerability in the native Mac OS X wireless drivers revealed last summer as well as e-mails showing he notified Apple.
Legal threats scuttle RFID flaw demo
Security technology giant HID uses patent claims to silence a security researcher scheduled to detail issues in radio-frequency identification (RFID) technology at a conference this week.
Google Desktop flaw allows data theft
Imperfect Storm aids spammers
The misnamed Storm Worm, actually a Trojan horse, underscores the evolution of spammers' tactics, including massive attacks on their critics and competitors. The first article in a two-part series.
U.S. calls for more organized cyber response
Federal officials renew calls for the private sector to help manage threats to critical infrastructure and the Internet.
Security pros work to undo teacher's conviction
Researchers aim to recreate what caused a classroom PC to start displaying pornographic pop-ups, an incident that has led to four felony convictions for the substitute teacher involved.