
In 2011, Chinese spies stole the crown jewels of cybersecurity—stripping protections from firms and government agencies worldwide. Here’s how it happened.

In 2011, Chinese spies stole the crown jewels of cybersecurity—stripping protections from firms and government agencies worldwide. Here’s how it happened.

Stopping payments would go a long way to stopping ransomware. But the choice is never quite so easy.

As the White House gets involved in the response, the group behind the malware is scrambling.

Emails from the Epic Games lawsuit show Apple brass discussing how to handle a 2015 iOS hack. The company never directly notified affected users.

An attack has crippled the company’s operations—and cut off a large portion of the East Coast’s fuel supply—in an ominous development for critical infrastructure.

A mental health startup built its business on easy-to-use technology. Patients joined in droves. Then came a catastrophic data breach.

Recent spying attacks against Pulse Secure VPN are just the latest example of a long-simmering cybersecurity meltdown.

This week, hackers stole confidential schematics from a third-party supplier and demanded $50 million not to release them.

The groups used social engineering techniques on Facebook to direct targets to a wide range of malware, including custom tools.