Google reveals inner workings of manual hijacking 2014. CNet. Charlie Osborne.
You've been arrested for computer crime: Here's what happens next 2013. The Register. Stuart Burns. The knock on the door you REALLY don't want to hear.
Malicious web-based attacks increased by nearly 600%: Websense 2013 Threatt 2013. Infotrac.
Chinese Hackers Installed Malware On National Research Council Computers 2014. via Huffington Post. Jim Bronskill, CP.
In China, Business Is War 2013. Harvard Business Review. Harvard University. Clyde Prestowitz.
Chinese cybercrime is a 'menace', says Google boss Eric Schmidt 2013. The Independent. James Legg. New book also moots 'some kind of revolution' in China.
Google boss Schmidt labels China an 'IT menace' 2013. British Broadcasting Corporation. The Independent. BBC.
New York Times says Chinese hackers breached its network 2013. Canadian Broadcasting Corporation. Associated Press. Paper was investigating Chinese Premier Wen Jiabao.
Got a botnet? Thinking of using it to mine Bitcoin? Don't bother 2014. The Register. Shaun Nichols. McAfee says crooks will be better off sticking to spam and DDoS.
Second Chinese army unit linked to corporate cyber espionage 2014. InfoWorld. Martyn Williams.
Nowhere to hide: The reign of cyber criminals is coming to an end 2014. InfoWorld. Roger A. Grimes.
At $400 Billion a Year, Cybercrime Is No Longer an 'Acceptable' Cost 2014. Motherboard. Victoria Turk.
The Latest Wave of Cyberattacks on the West Is Coming from the Middle East 2014. MOtherboard. Thomas Brewster.
Reporting From the Web's Underbelly 2014. New York Times Bits. Nicole Perlroth.
Kaspersky rips The Mask from sneaky Spanish spy campaign 2014. The Register. John Leyden.
ChewBacca point-of-sale keylogger SLURPS your CREDIT CARD data 2014. The Register. John Leyden. Latest nasty blamed for theft of 49,000 punters' details.
Cybercriminals Are Eyeing These 5 Targets In 2014 2014. Canadian Broadcasting Corporation.
New York Times Hacked? Syrian Electronic Army Suspected Of Attacking Site 2013. Huffington Post. Katherine Fung.
The Internet, which lives forever, is a stalker's best torture device 2013. Toronto Star. Heather Mallick.
ATM Fraud Allows Thieves To Steal $45 Million In Hours 2013. Huffington Post. AP.
Teacher 'powerless' to stop ex-girlfriend's cyberstalking 2013. CBC. Canadian Broadcasting Company. Kathy Tomlinson. Court order fails to prevent comments from being posted online.
Hackers attack Microsoft computers 2013. British Broadcasting Corporation. BBC. BBC.
NBC.com HACKED to spread bank account-raiding Trojan 2013. The Register. John Leyden. 'No user info compromised' insists US telly network.
Cybercrime Network Based in Spain Is Broken Up 2013. New York Times. Raphael Minder.
Energy Department hacked, says no classified data was compromised 2013. Reuters. Timothy Gardner.
Cybercrime backlog poses 'significant risk' to RCMP, audit warns 2013. CTV News. Canadian Press. Jim Brownskill.
For PC Virus Victims, Pay or Else 2012. New York Times. Nicole Perlroth.
Cyber-attackers finding a home in Canada, government fears 2012. Vancouver Sun. Jim Bronskill.
Multinational Crackdown on Computer Con Artists 2012. New York Times. Edward Wyatt.
Oil and gas giants' PCs polluted by new cyber-spy Trojan 2012. The Register. John Leyden. Advanced Persistent Threat 'Mirage' group is back.
Chemical biz 'Nitro' hackers use Java to coat PCs in poison ivy 2012. The Register. John Leyden. Chinese spying crew is back in business.
DDoS blackmailers busted in cross-border swoop 2012. The Register. Phil Muncaster. Cyber hoodlums targeted gold and silver traders.
Scandal ad slingers cough up $100k in 'Facebook clickjack' case 2012. The Register. John Leyden. Marketing biz 'earning $1.2m a month' settles out of court.
Everything you thought you knew about cybercrims is WRONG 2012. The Register. John Leyden. Forget teen hackers, they're aging gangsters with off-the-shelf web weapons.
Traveling Light in a Time of Digital Thievery 2012. New York Times. Nicole Perlroth.
Citadel banking malware is evolving and spreading rapidly, researchers warn 2012. Infoworld. Lucian Contantin.
Hidden Dragon: The Chinese cyber menace 2011. The Register. John Leyden. 'Any decent government does industrial espionage'.
Facebook scams now spread by dodgy browser plug-ins 2011. The Register. John Leyden. Cybercrooks deploy new weapon to pollute profiles.
iPad scammers pwn Lady Gaga's Facebook page 2011. The Register. John Leyden. We're plastic but we'll still have fun....
Web scam-busting trio thwarted by mystery DDoS rocket 2011. The Register. John Leyden. Backhanded compliment for fraud alert sites.
Espionage hack attack preys on chemical firms 2011. The Register. Dan Goodin. Spotted in the wild: Nitro Part II.
Dozens of chemical firms hit in espionage hack attack 2011. The Register. Dan Goodin. Defense contractors, Fortune 100 companies, too.
Big biz told to reveal hack attacks 2011. The Register. Brid-Aine Parnell. Investors need to know about compromises, says SEC.
Facebook scammers exploit Steve Jobs' death 2011. The Register. John Leyden. Offer of non-existent iPads lures thousands.
Microsoft turns to FBI in hunt for Rustock ringleader 2011. The Register. Dan Goodin. Targets Cosma2k after botnet victory.
Bargain-basement botnet kit - yours for just ?5 2011. The Register. John Leyden. German hacker serves up the 'people's bot'.
How to go from the IT dept to being a rogue trader 2011. The Register. Dominic Conner. Remember, the successful ones are still out there.
Man sentenced to 14 years for mass credit card theft 2011. The Register. Dan Goodin. $3 million in losses.
Cyber crime now bigger than the drugs trade 2011. The Register. Brid-Aine Parnell. Says cyber security firm.
Spear phishers renew attack on feds' Gmail 2011. The Register. Dan Goodin. Gov officials (still) stalked.
Citi Says Credit Card Customers' Data Was Hacked 2011. New York Times. Chris V. Nicholson and Eric Dash.
E-Mail Fraud Hides Behind Friendly Face 2011. New York Times. Matt Richtel.
Massachusetts PCs infected by data-hungry worm 2011. The Register. Dan Goodin. How nasty was it? Let us count the ways.
After Breach, Companies Warn of E-Mail Fraud 2011. New York Times. Miguel Helft.
RSA explains how attackers breached its systems 2011. The Register. John Leyden. Howdunnit explained but depth of hack or what was taken remain a mystery.
Part 2: Help Solve an Open Murder Case 2011. Federal Bureau of Investigation. FBI. Cryptanalysts.
Programmer gets 8 years for theft of stock trading software 2011. The Register. Dan Goodin. Wall Street-ware generated $500m in profits.
SecurID Company Suffers a Breach of Data Security 2011. New York Times. John Markoff.
Poker Bots Invade Online Gambling 2011. New York Times. Gabriel Dance. Smarter than you think....
Nasdaq admits hackers planted malware on web portal 2011. The Register. John Leyden. Stock tickler.
Researchers pry open Waledac, find 500,000 email passwords 2011. The Register. Dan Goodin. Son of Storm is back.
Hackers sell access to hacked .mil and .gov sites 2011. The Register. John Leyden. Command and control? Yours for $500, guv.
For sale: 50,000 compromised iTunes accounts 2011. The Register. Dan Goodin. Music and movies for pennies on the dollar.
Wi-Fi hack threat man pleads guilty 2010. The Register. John Leyden. US neighbourhood feud turns nasty.
Feds seize $143m worth of bogus networking gear 2010. The Register. Dan Goodin. From China, with bugs (and backdoors?).
Texas man cops to botnet-for-hire charges 2010. The Register. Dan Goodin. DDoS demo backfires.
Cyberattack on Google Said to Hit Password System 2010. New York Times. John Markoff.
FBI figures show huge rise in online miscreantage 2010. The Register. John Leyden. Cybercrime losses almost double.
Botnet takedowns 'don't hurt crooks enough' 2010. The Register. John Leyden. Punching fog.
MS uses court order to take out Waledac botnet 2010. The Register. John Leyden. Zombie network decapitated. For now.
Scareware scams switch to social network smut lures 2010. The Register. John Leyden. One stop shops for info theft and scareware fraud.
Sweden to prosecute alleged Cisco, NASA hacker 2010. The Register. Dan Goodin. Stakkato's abrupt transfer.
China stomps cybercrook training outfit 2010. The Register. John Leyden. Black Hawk taken down.
Half a million PCs can access Schengen's 'secure' database 2010. The Register. John Oates. Big network, big danger.
Oil companies hit by 'state' cyber attacks, says report 2010. The Register. Dan Goodin. Petrol reserves data targeted.
Feds investigate theft of $3m from NY school 2010. The Register. Dan Goodin. An epidemic continues.
Wanted: `Cyber Ninjas' 2009. New York Times. Christopher Drew. Cybersecurity.
Botnet click fraud at record high 2009. The Register. Dan Goodin. Move over, mules.
Hackers demand $10m ransom for Virginia medical data 2009. The Register. Dan Goodin. 8.3 million records held hostage.
Battle Over Stolen Goods Sold Online Goes to Washington 2008. New York Times. Brad Stone. National Retail Federation: fencing using Internet addictive.
Crimeware giants form botnet tag team 2008. The Register. Dan Goodin. Online bankers beware.
Employee's silent rampage wipes out $2.5m worth of data 2008. The Register. Dan Goodin. Backups? What backups?.
Inside a cyber-crook's Xmas wish list 2006. The Register. John Leyden. Credit card and birth certificate flea market.
Bot nets likely behind jump in spam 2006. Security Focus. Robert Lernos. Where does SPAM come from?.
Trojan attack takes files hostage 2006. The Register. John Leyden. Your money or your data....
Zombie PCs menace mankind 2006. The Register. John Leyden. Cybercrooks - online mafia.
Spam Slayer: Next-Generation Spam 2006. PC World. Tom Spring. Spam that bites.
Beware of How You Google 2005. eWeek.com. Ryan Naraine. Spelling does count! Another good reason to use a start page..
Hacking Google for Fun and Profit 2005. The Registry. John Leyden. Black Hats Google too!.
Online extortion works 2004. The Register. Scott Granneman. Cyberextortion, A-Z.
Feds bust DDoS "Mafia" 2004. The Register. Kevin Poulsen. DDoS for hire.
Cyber-Extortion: When Data is Held Hostage 2000. Business Week Online. Alex Salkever. Cyberextortion, the cost of doing business online.
Cybercrooks plant phishing scam on crime reduction website The Register. John Leyden. Who can you trust?.
Control Systems Security Assessements 2008. New York Times. Marty Edwards and Todd Stauffer. Powerpoint slideshow outlines industrial controls vulnerabilities.
Computer Crime and Intellectual Property Section (CCIPS) 2006. usdoj.gov. United States Department of Defence. US DoJ on cybercrime.
100 Arrested in Online Fraud Crackdown 2009. The Register. Brad Stone. Operation Phish Phry.
Crimeware grifters scamming naive phishers 2008. The Register. John Leyden. "There is no free phish".
Phishing coders hook clueless crooks 2008. The Register. John Leyden. Who can you trust?.
Grifters find rich pickings on social networking sites 2007. The Register. John Leyden. Steal yourFace.
MySpace phishing scam targets music fans 2006. The Register. John Leyden. Spam lures recipients to phishing sites.
Underground showdown: defacers take on phishers 2005. The Register. Robert Lemos. Defacing de phishers.
Phishing gets personal 2005. The Register. John Leyden. Phishing - who can you trust?.
Anti-Phishing Working Group Homepage 2005. Anti-Phishing Working Group. Phishing - all about + report attacks here.
On EBay, E-Mail Phishers Find a Well-Stocked Pond 2005. New York Times. Phishing on eBay.
Phishing morphs into pharming 2005. The Register. John Leyden. Nascent threat worries security researchers.
Need Some Espionage Done? Hackers Are for Hire Online 2015. New York Times. Matthew Goldstein.
The time a major financial institution was hacked in under 15 minutes 2015. Washington Post. Brian Fung.
2014. Nicole Perlroth. New York Times. Russian Arrested in Guam on Array of U.S. Hacking Charges.
Cybercrime costs $445B US a year to global economy, report finds 2014. CBCNews. Thomson Reuters.