Computer whizzes at the National Security Agency were called in only after the Office of Personnel Management detected its network had been penetrated, NSA Director Adm. Michael Rogers said Tuesday night. Ultimately, hackers made off with personal information on millions of national security personnel.
As President Xi Jinping of China prepares for his first state visit to the United States this month, Washington has warned that it could hit Chinese companies with sanctions over digital attacks for trade secrets. Beijing is now pushing back in an unorthodox way: by organizing a technology forum to demonstrate its own sway over the American tech industry.
While investigating the infamous Russian-speaking cyberespionage actor Turla, Kaspersky Lab researchers have discovered that the group is evading detection of its activity and physical location of its Command and Control servers (C&C) by using security weaknesses in global satellite networks.
The rise of attacks that use file-less malware and other anti-forensics measures is creating a greater-than-ever skills gap in the cybersecurity industry.
A man sentenced to life without parole on a marijuana-related charge was freed Tuesday from a Missouri prison after being behind bars for more than two decades — a period in which the nation's attitudes toward pot steadily softened.
It has been a violent Labor Day weekend in Charlotte after 12 people were shot, and five of them killed, in multiple shootings - and one of the victims was a 7-year-old boy.
Two major security vendors are working quickly to fix problems in their products after security researchers publicly disclosed vulnerabilities over the past few days.
The Latvian man accused of helping create the Gozi virus, which United States prosecutors dubbed "one of the most financially destructive computer viruses in history," has pleaded guilty.
The Sliding Scale of Cyber Security is a model for providing a nuanced discussion to the categories of actions and investments that contribute to cyber security. The five categories in the scale are Architecture, Passive Defense, Active Defense, Intelligence, and Offense. The continuum between the five categories helps visualize that not all actions are static or easily defined.
Mozilla, creator of the Firefox web browser, said hackers had stolen security-sensitive information from Bugzilla, its bug tracker, and used it to "attack" Firefox users.
Microsoft Corp. gets a second chance to prove it's entitled to keep data stored overseas out of the hands of U.S. investigators when its lawyers appear before a federal appeals court Wednesday, but the computer software giant is already hedging its bets, calling on Congress to clarify the law.
Forensic fiber examination is one of the most established forensic evidence types. It is one of the most researched and respected of all evidence types among the global forensic science community. So why is it that the use of fibers as tool in forensic investigations has declined so much?
Investigators continue working to identify the remains found inside a burning truck but it could be some time before they have an answer. Caddo Parish, Louisiana Coroner Todd Thoma is tasked with identifying the remains.
Quickly moving through security checkpoints by showing your hand to a scanner seems straight out of science fiction, but the National Institute of Standards and Technology is working with industry to bring fast, touchless fingerprint readers out of the lab and into the marketplace.
Later this month, a North Carolina high school student will appear in a state court and face five child pornography-related charges for engaging in consensual sexting with his girlfriend.