Milan prosecutors are investigating six former employees of surveillance software maker Hacking Team in connection with a massive attack on the data system of the Italian cybersecurity firm, sources familiar with the case said on Friday.
A group of Italian researchers have come up with new obfuscation techniques that can be used to dupe malware detection systems and allow malicious actors to execute successful drive-by download attacks.
Adobe Flash may be all the attack rage lately, but Oracle's new pile of patches - including one for an 0day spotted in the wild - highlight how Java remains an attractive target.
Almost a third of the world's encrypted Web connections can be cracked using an exploit that's growing increasingly practical, computer scientists have warned. They said the attack technique on a cryptographic cipher known as RC4 can also be used to break into wireless networks protected by the Wi-Fi Protected Access Temporal Key Integrity Protocol.
The more that is known about a science, the more uses tend to be found for it. But in the case of forensics — the discipline through which villains are identified by stray fingerprints, stands of hair or other giveaways — it seems that the more is discovered about the field, the more courts are losing faith in it.
Medical examiners found no evidence to prove the allegation that blues legend B.B. King was poisoned before he died of natural causes in May, according to autopsy findings made public.
The Office of Personnel Management announced last week that the personal data for 21.5 million people had been stolen. But for national security professionals and cybersecurity experts, the more troubling issue is the theft of 1.1 million fingerprints.
United Continental Holdings Inc has awarded millions of frequent flier miles to hackers who have uncovered gaps in the carrier's web security, in a first for the U.S. airline industry.
At a hearing on the role the Interior Department played in a recent breach at the Office of Personnel Management, the Interior deputy inspector general painted a picture of how a hacker might have breached the agency's computer system.
One driver, one license, that’s how it’s supposed to be. But some fraudsters or drivers with serious violations try to beat the system by getting multiple licenses using different names. But now, states increasingly are foiling the crooks and scam artists by employing a high-tech tool: facial recognition software.
A former Uber driver accused of sexually assaulting a female passenger last year is now facing charges in five unsolved Boston rape cases going back almost a decade, the district attorney and police officials have announced.
Investigators shut down an online marketplace where cyber criminals bought and sold hacked databases, malicious software and other products that could cripple or steal information from computer systems, the Justice Department announced Wednesday.
Autopsies are once again being performed in Montana. Bodies needing autopsies had been sent to either Seattle or Rapid City, South Dakota since about July 1.
A Chicago man has been arrested in a 2012 burglary when fingerprint analysis came back from the state crime lab three years after the crime, Evanston, Illinois police said.
Witnesses will give new testimony in the fraud trial of a lottery worker accused of orchestrating the largest lotto scam ever. Eddie Tipton was one of only four people who had security clearance to the lottery's so-called drawing room. It is there that investigators say he hacked into computers and installed sophisticated malware that was designed to vanish without a trace.