RSA, The Security Division of EMC, has released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey of the Security for Business Innovation Council (SBIC), a group of top security leaders from the Global 1000.
When a data breach occurs and personal information is stolen, where does it end up? Bitglass researchers decided to find out.
Digital currencies are an increasingly important aspect of e-commerce and other transactional arenas. But be aware: Bitcoin, and other cryptocurrencies based on blockchain technology, have a few flaws that could open them up for abuse by enterprising hackers.
Deloitte Cyber Risk Service stages executive war games to show what might happen in the C-Suite after a breach.
The FBI is advising people responsible for WordPress websites to be on the lookout for attacks carried out by individuals sympathetic to the Islamic State of Iraq and al-Shams terrorist group, which is also known as the Islamic State in the Levant.
DNA profiling (or genetic fingerprinting) has proved a revolutionary tool for forensic investigators as a means to identify potential suspects, exonerate the innocent and convict the guilty. But, like any forensic technique, it has its limitations. One limitation is in cases involving identical twins, something that has raised technical, legal and ethical problems – until now.
The list of active cases at the cyber forensics lab at Armstrong State University’s police department is more representative of surrounding Savannah than the sleepy campus. That’s because other law enforcement agencies — from local police to the FBI — take advantage of something Armstrong’s officers have in abundance: time and cyber crime expertise.
In many U.S. police departments, ballistic evidence might be shelved in an overworked crime lab, where analysts would only run it through the database to prepare a case for trial. But authorities in Denver are leading a national trend to put ballistics evidence into the hands of investigators much more quickly — before leads dry up and suspects disappear.
Recently, Anthony Hinton became the 152nd death-row prisoner to be exonerated since 1973. Like most people who’ve been exonerated to date, Hinton didn’t rely on new DNA evidence to prove him innocent.
A new report describes findings about unsubmitted sexual assault kits in Wayne County (Detroit), Michigan. A multidisciplinary team investigated the situation and found a number of effective and sustainable responses and ways to prevent the problem from recurring.
Iraqi forensic teams in the newly recaptured city of Tikrit have started exhuming bodies from mass graves believed to contain some of the hundreds of soldiers killed by Islamic State militants last year, a government spokesman said Tuesday.
The tech community has long called for reforming the 1986 Computer Fraud and Abuse Act for its overly broad language. But now many worry a White House plan to toughen the law will have a chilling effect on work to expose software weaknesses.
On the second floor of a narrow brick building in the London Borough of Islington, Edin Omanovic is busy creating a fake company. He is playing with the invented company’s business cards in a graphic design program, darkening the reds, bolding the blacks, and testing fonts to strike the right tone: informational, ambiguous, no bells and whistles. In a separate window, a barren website is starting to take shape.
Hacking attacks that destroy rather than steal data or that manipulate equipment are far more prevalent than widely believed, according to a survey of critical infrastructure organizations throughout North and South America.
Pro-Palestinian hackers disrupted Israeli websites on Tuesday, following threats from the Anonymous hacking collective that it would carry out an "electronic Holocaust," though Israeli cyber experts said the coordinated attacks caused little damage.