The automaker contends it only uses data for customer requests and to troubleshoot problems.
iSight describes the Trojan as sophisticated derivation of older point-of-sale malware.
Appeals court rejects company's petition for another hearing about its data-collection from neighborhood Wi-Fi networks while building Street View.
For the first time, hackers market stolen data with info on the location of store where card was used; experts say new strategy will slow detection.
Massachusetts Sen. Edward Markey is asking what carmakers are doing to prevent hacks of navigation, tire pressure, and braking systems.
Several advocacy groups are calling for an investigation into Internet companies Yahoo and Google whose networks were secretly accessed by the National Security Agency.
In a rare move, a federal court in Idaho ordered a software developer's computer seized and its contents copied without prior notice because the developer described himself as a 'hacker' on his website.
A U.S appellate court's decision earlier this week to permit a wiretapping case against Google to proceed, is based on flawed reasoning, a leading technology think-tank says.
Though the National Security Agency spends billions of dollars to crack encryption technologies, security experts maintain that properly implemented, encryption is still the best way to maintain online privacy.
Less than two weeks after suffering a prolonged website outage, the New York Times was knocked offline again on Tuesday--apparently as the result of a malicious hacking attack.
Malware writers are ramping up their use of commercial file hosting sites and cloud services to distribute malware programs, security researchers said at this week's Black Hat conference here.
More secret NSA documents leaked by Edward Snowden suggest that the U.S. agency's British counterpart intercepts petabytes worth of communication data daily from fiber-optic cables.
In what's quickly turning out to be a replay of events from last year, the White House today signaled that it would not support the recently reintroduced Cyber Intelligence Sharing and Protection Act (CISPA) in its present form.
The Department of Homeland Security alert was prompted by an incident last October in which 11 companies in the energy sector were targeted in a sophisticated spear-phishing campaign apparently aimed at breaching their network security.
Articles by Jaikumar VijayanNext Page