Russian Hackers used a phishing email sent to the State Department as a jumping off point to infiltrate White House systems. Non-classified, but sensitive, data was taken. The hackers have also been able to reenter the State Department's system, despite efforts to keep them out.
Last December, Police in Massachusetts confronted a new, and growing, frontier in cyber terrorism when the CryptoLocker ransomware virus infected the department’s network, encrypting essential department files until the town paid a $500 bitcoin ransom.
A new group of international cybercrime fighters claimed one of its first kills Thursday, pulling the plug on malicious servers that hijacked at least 12,000 machines, most of them in the United States.
Malware-as-a-service trend has effectively democratized the means for hackers of all skill levels to launch damaging attacks, with cyber criminals blending cutting edge tools with tried-and-tested techniques.
Ransomware is one of the fastest-growing forms of hacking, cybersecurity experts say. Anyone from a home computer user to a Fortune 500 company can be infected. It can also attack smartphones. The smaller the users, the more vulnerable they are to losing their files — unless they have a secure backup for their system or go through the complicated process of paying cyber criminals.
Dzhokhar Tsarnaev was convicted Wednesday in the Boston Marathon bombing by a federal jury that now must decide whether the 21-year-old former college student should be executed. His conviction was practically a foregone conclusion, given his lawyer's startling admission during opening statements that Tsarnaev carried out the attack with his now-dead older brother, Tamerlan.
London police say heavy cutting equipment has been used to break into a vault containing safety deposit boxes in the Hatton Garden jewelry district.
RSA, The Security Division of EMC, has released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey of the Security for Business Innovation Council (SBIC), a group of top security leaders from the Global 1000.
When a data breach occurs and personal information is stolen, where does it end up? Bitglass researchers decided to find out.
Digital currencies are an increasingly important aspect of e-commerce and other transactional arenas. But be aware: Bitcoin, and other cryptocurrencies based on blockchain technology, have a few flaws that could open them up for abuse by enterprising hackers.
Deloitte Cyber Risk Service stages executive war games to show what might happen in the C-Suite after a breach.
The FBI is advising people responsible for WordPress websites to be on the lookout for attacks carried out by individuals sympathetic to the Islamic State of Iraq and al-Shams terrorist group, which is also known as the Islamic State in the Levant.
DNA profiling (or genetic fingerprinting) has proved a revolutionary tool for forensic investigators as a means to identify potential suspects, exonerate the innocent and convict the guilty. But, like any forensic technique, it has its limitations. One limitation is in cases involving identical twins, something that has raised technical, legal and ethical problems – until now.
The list of active cases at the cyber forensics lab at Armstrong State University’s police department is more representative of surrounding Savannah than the sleepy campus. That’s because other law enforcement agencies — from local police to the FBI — take advantage of something Armstrong’s officers have in abundance: time and cyber crime expertise.
In many U.S. police departments, ballistic evidence might be shelved in an overworked crime lab, where analysts would only run it through the database to prepare a case for trial. But authorities in Denver are leading a national trend to put ballistics evidence into the hands of investigators much more quickly — before leads dry up and suspects disappear.