Article | 16/05/2013 Four former LulzSec members sentenced to prison in the UKFour British men associated with the LulzSec hacker collective received prison sentences Thursday for their roles in cyberattacks launched by the grou...
Article | 15/05/2013 Researchers develop industrial systems that watch for security breachesWith the new networking method, devices are able spot a problem unit and then isolate it from the network before it can do any damage
Article | 10/05/2013 Payment card processors hacked in $45 million fraudA vast debit card fraud scheme that allegedly netted $US45 million has been linked to the hacking of credit card processors in the US and India.
Article | 8/05/2013 Spamhaus DDoS suspect extradited to the NetherlandsA 35-year-old Dutchman suspected of participating in a large DDoS attack on antispam organization Spamhaus was extradited from Spain to the Netherland...
Article | 11/06/2009 Europe looks to step up fight against cybercrimeThe European Commission is seeking to strengthen cooperation between law enforcement and private industry worldwide as well as increase penalties for ...
Article | 21/01/2009 Three years undercover with the identity thievesSalesmen and parents know the technique well. It's called the takeaway, and as far as Keith Mularski is concerned, it's the reason he kept his job as ...
Article | 20/10/2008 Up next: Cellular botnets, cyber militiasThe ability of malware writers to consistently stay ahead of those seeking to stop them has been a constant factor in the security industry over the p...
Article | 16/10/2008 Cyber security threats grow in sophistication, subtletyThe annual report from Georgia Tech Information Security Center identifies five evolving cyber security threats, and the news is not good.
Whitepapers about cybercrime
The new threat landscape has changed. Cybercriminals are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. Simply put, the cyber offense has outpaced the defensive technologies used by most companies today. Find out more on how to protect against the next generation of cyber-attacks.
Best Deals on PCWorld
- Networking, Wireless & VoIPView all »
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
Sign up to PC World Today for the latest news, reviews and galleries from PC World Australia.Sign up now »
- FTWeb Analyst - WebTrendsVIC
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTest EngineerVIC
- FTQuality ManagerSA
- FTTechnical Business AnalystNSW
- FTOS Web Applications DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTR&D EngineerSA
- FTLead Software EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTTechnical Consulting ManagerNSW
- FTSenior Python DeveloperNSW