Hong Kong Stock Exchange suspends trading after hackers close news website
The Hong Kong Stock Exchange was forced to suspend afternoon trading in seven listed companies after the news portion of its website was hit by hackers.
More results...
The Hong Kong Stock Exchange was forced to suspend afternoon trading in seven listed companies after the news portion of its website was hit by hackers.
A malware-laden autowhaler application unleashed to infect cybercriminals stealing from phishers, and a rogue anti-virus product offering up a fake codec suite for sale after it disables users’ video players, top GFI Software’s list of the most prevale…
Prime minister David Cameron has said government will crack down on rioters using social networks to communicate, as Parliament was recalled from its summer recess to discuss the outbreak of violence this week.
The smartphone, and increasingly the tablet, are fast becoming the primary device of choice for both personal and enterprise use. Infosecurity spoke with Omri Sigelman, VP of marketing and products for AVG Mobile Solutions, at last week’s Black Hat con…
Myanmar has come out of nowhere to top the list of sources of malicious internet traffic in Akamai’s State of the Internet report, the first time the country has ever appeared on the list.
A leading IT security expert is warning companies that AV, firewalls and IDS technology may no longer be enough to defend company IT resources against attacks.
Nearly 25% of engineers said they personally knew about security problems in their company’s smart devices that have not been disclosed to their customers and the general public, according to a recent survey by device security firm Mocana.
Effective Oct. 1, 2012, Visa is eliminating the requirement for US merchants to annually validate their compliance with the PCI Data Security Standard (PCI DSS) if 75% of the merchant’s annual Visa transactions originate from chip-enabled terminals.
The latest monthly malware and threats report from GFI Labs – the research operation of GFI Software – claims that cybercriminals are now stealing end user credentials from each other, as well as using complex new methodologies when seeking to infect e…
A security researcher with Computer Associates has carried out an in-depth analysis of the SpyEye trojan and concluded that the malware has been cleverly coded to hide the fact that it is really little more than a clever piece of credential-grabbing co…