IBM purchased Trusteer, a security software developer, in order to build a cybersecurity lab in Israel.
The campaign has affected 650 Israeli government, personal and corporate sites.
With televisions and toilets now connected to the Internet, hackers have developed new methods for invading your life.
Users of the anonymous TOR network are blaming the FBI for a malware that sends their identities to a server in Virginia.
Many politicians end up getting caught having an extramarital affair. But one official in China managed to have 140.
A 2009 figure on the global cost of hacking, cited by intelligence officials and President Obama, was grossly inflated. Did McAfee report a false number to profit from government cybersecurity expansions?
The Silicon Valley tech giant is betting cybersecurity will become more important in years to come.
Classified data about the South Korean military and U.S. forces in South Korea are the target of a cyberspying campaign, a report says.
The reported investigation of Gen. James Cartwright over leaks about U.S.-Israeli cyber-attacks on Iran seems very curious.
The Zeus malware, which can drain bank accounts and steal passwords, has found a new home on Facebook.
Microsoft, along with the FBI and other authorities, disrupted a cyber crime network that led to $500 million in losses to financial institutions.
A Chinese official claimed possession of data pointing to U.S. cyber attacks targeting China, but refrained from accusing the U.S. administration of such attacks.
China is planning to run the first-ever digital war games to test out cyberwarfare capabilities.
The teenager was allegedly lured to her death by a fake Facebook profile.
To combat online piracy, the entertainment industry has proposed using malware to track illegal content.
Chinese hackers have gained access to critical weapons systems designs, according to a Pentagon report.
A new Pentagon report blames the Chinese military for numerous cyberattacks on military computers,
China is carrying out systematic cyber-espionage on the U.S. military and private businesses to acquire technology, the Pentagon charged Monday in its most blunt assessment yet.
A hack on a U.S. army database containing information about thousands dams was traced to China.
The Senate will not vote on the controversial 2013 cybersecurity bill passed by the House this month.
A video visualization shows what a DDoS hack attack looks like.
The U.S. House of Representatives approved the highly controversial CISPA bill on Thursday, and IBM couldn't be any happier.