There are six men. All dressed in black like the ones in the famous movie. They have black cases too but they are not using their technology to erase your memory. Their name: NATO Rapid Reaction Team, or RRT. Their aim: to provide assistance to NATO nations or facilities suffering a cyber attack.
One of the national organizations that governs DNA laboratories has ordered Washington D.C.'s...
This project generated a national isotope database derived from the WBDSC and the other donated...
Scientists have invented sophisticated fluorescent inks that one day could be used as...
Within 48 hours of the slayings of David and Nicholas Pence, investigators with the Jefferson Parish Sheriff's Office in Louisiana had identified suspects in the brutal shotgun execution of the Metairie father and son and taken those believed responsible into custody.
A note of caution to anyone who works on the security team of a major automobile manufacturer: Don’t plan your summer vacation just yet. At the Black Hat and Defcon security conferences this August, security researchers have announced they plan to wirelessly hack the digital network of a car or truck.
Romanian authorities have detained 25 people who are suspected of being members of an international gang of cyber thieves who hacked into banks, cloned payment cards and used them to steal over $15 million.
Yet another biometric authentication mechanism has proven to be fallible. It turns out that a flaw in the Samsung Galaxy S5 and other Android smartphones allows hackers to steal fingerprint data and clone prints for further attacks.
The falling price of Bitcoin is forcing ransomware masterminds to convert the crypto-currency as soon as they can. Rather than holding on to their ill-gotten BTC, criminals are simply laundering the ransom money as soon as possible.
This study’s goal was to integrate Akonni’s Biosystems, Inc.’s patented sample preparation (TruTip), thermocyling, and gel drop microarray (TruArray) technologies for the typing of SNPs in forensic applications. An Akonni integrated system would aid in rapidly apprehending a perpetrator or identifying a victim.
Police forces across the UK are testing technology that allows officers to analyse DNA samples in custody suites, amid fears that civil liberties could be infringed and evidence compromised.
A newly-released document from the Central Intelligence Agency’s (CIA) own internal watchdog found that the government’s controversial warrantless surveillance and bulk data collection program was so secretive that the agency was unable to make “full use” of its capabilities even several years after the September 11 attacks.
Champlain College has been recognized for the second time as winner of the Professional Award for Best Cybersecurity Higher Education Program at the 2015 SC Awards. The award was presented during the 2015 SC Awards Gala held in San Francisco.
The cybersecurity workforce gap has been well-documented — and cultivating the next generation of cyber workers, the Millennials, from an early age has been widely seen as a mandate for continued industry viability.
Germany's intelligence service, the Bundesnachrichtendienst (BND), has been helping the NSA spy on European politicians and companies for years, according to the German news magazine Der Spiegel.
Defense Secretary Ash Carter announced new partnership initiatives on the first day of a two-day visit to California's Silicon Valley to learn from experts who run some of the highest-tech companies in one of the nation's innovation hotspots.
While the world of 3D printing is still in a fairly lawless, unregulated state (one to be enjoyed while it lasts by those on the right side of the law), that doesn’t mean it can’t be used to the law’s benefit.
The contradiction in the debate over whether law enforcement should have guaranteed access to data while still advocating privacy is not easily reconciled.
CTI is the application of intelligence tactics to gain insights on adversarial actors and their tools, techniques, and procedures. However, one aspect that’s not frequently discussed is the use of counterintelligence tactics by both the defender and the adversary.