Narrow your search
Pump-mounted devices used Bluetooth chips that allowed the thieves to retrieve the data without having to physically connect to the devices, prosecutors allege.
Mobile payments system can be used to transfer money into accounts from stolen cards and to skim cards, researchers say.
Hacking, malware, and physical attacks such as ATM and gas pump skimming are the most popular methods for stealing data, report says.
A new content stream aggregator called Skimmer lets you keep an eye on Twitter, Facebook, Flickr, and more--all in one place using Adobe AIR.
A "skunk works" team is considering a wide range of technologies to clean up oil in the Gulf, using ideas from outsiders at a scale never done before.
Even as the world waits to see whether BP can permanently stem the flow of oil into the Gulf, the company is evaluating technologies to clean up the disaster.
New Windows software app qStatus has come all the way from a paid app for jailbroken iPhones to a very legitimate, useful desktop application for updating your Twitter and Facebook status on the fly.
The trail of online fraud leads through malicious Web sites, hacked databases, underground criminal forums, and across country borders. We'll guide you through it.
Chief security adviser at F-Secure talks about cybercrime and the need for a new international agency to handle such crimes.
Through a method called skimming, a digital copy of your debit card is made at a compromised ATM, and then the data is sent over SMS to awaiting criminals.