Taiwan wants to join a major anti-hacking drill conducted by the United States to strengthen cyber security ties with its staunchest ally, its vice premier said on Monday, a move which would help safeguard against constant targeting by hackers in rival China.
On Friday, GitHub, the open-source software code collaboration site, said they were experiencing...
In the young, billion-dollar growth sector of threat intel, vendors are falling over themselves...
The Web is a more dangerous place than most people may think. With more than one billion...
In the years since the 9/11 attacks, the world has averaged about two-dozen shooting wars ongoing at any given time. Most have taken the form of armed insurgencies, suggesting that a fresh new "greening" of guerrilla warfare is under way. During this same period, cyber wars have been fewer in number, but have reflected greater diversity. Perhaps the best way to portray the cyberwar spectrum is by grouping these conflicts by type.
Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.
U.S. intelligence agencies in June will stop bulk collection of data documenting calls by U.S. telephone subscribers, unless Congress extends a law authorizing the spying, U.S. officials said.
Crime Attorney Arkady Bukh thinks that because of the US-led sanctions on Russia, there may be more hackers showing up. These are seven of the Russian Hackers that have already infiltrated US computer systems and have been caught.
StubHub brokers the buying and selling of tickets to sporting events, music concerts, theater shows and more. The crooks, it seems, made their money by buying tickets fraudulently via compromised StubHub accounts, and then sending those tickets to scalpers who sold them "on the ground" shortly before each event was due to start.
New data shows prevalence of often-undetectable DDoS attacks aimed at quietly wreaking havoc on the network while performing data exfiltration and other attacks.
Talyor Swift joins Harvard and Microsoft in buying up domain names that have their names ending in .adult and .porn.
Another popular Yoast Wordpress plugin has been found sporting a critical vulnerability that can be exploited by attackers to take over control of the site.
China's Defense Ministry has denied that it had anything to do with a cyber attack on Register.com, a unit of Web.com, following a report in the Financial Times that the FBI was looking into the Chinese military's involvement.
A New York City Police Department (NYPD) auxiliary deputy inspector was arrested recently for trying to hack into restricted law enforcement databases.
Rocket Kitten, the cyberattack group that recently launched an email malware campaign against European and Israeli targets, has delivered a new state-sponsored attack, according the a report by Trend Micro.
A while back, I tweeted, saying that "threat intel has it's own order of volatility." That tweet got one RT and 2 favorites, and at the time, not much of a response beyond that. Along the way, someone did disagree with me on that, stating that rather than an "order of volatility," threat intel instead has a "shelf life."
Target has proposed to pay $10 million to settle a class-action lawsuit brought against the retailer following a massive data breach in 2013. Individuals affected by the breach could get up to a maximum of $10,000, the proposal says.
In the 18 months since the Silk Road online black market for narcotics was taken down by a swarm of three-letter agencies, a site known as Evolution has taken its place at the top of the dark web drug trade. Now Evolution, too, has suddenly dropped off the face of the internet. But unlike its Silk Road predecessor, there’s no indication that law enforcement took down the newer black market.
Forrester's 2015 "Planning for Failure" shows that breaches are as unavoidable as bad weather, but hits a sour note when it characterizes enterprise organizations as unprepared.
If we want security to keep pace with technological innovations by criminals, we need to ensure that we have a variety of effective tools to combat evolving cyber threats like these. One powerful tool that the DOJ has used to disrupt botnets and free victim computers from criminal malware is the civil injunction process.
The Financial Industry Regulatory Authority (FINRA) seems to have just discovered that something needs to be done after a cybersecurity breech, according to Reuters.
If anyone had forgotten the sheer scale of the dark-web drug trade, German police just offered a helpful reminder. They’ve seized more than a third of a ton of narcotics from a single online drug seller—a haul that, despite its size, represents an insignificant dent in the burgeoning digital narcotics market known as Evolution.
Cryptography Services, a team of consultants from several security research firms, have announced that they have been tasked with auditing OpenSSL, the popular and widely used open-source implementation of the SSL and TLS protocols.
Users of an email service backed by the German government will soon be able to rely on strong encryption of the kind that used to be the preserve of geeks and hackers, officials have said.
How can organizations provide actionable threat intelligence in an effective and efficient manner?
Two Vietnamese citizens and a Canadian have been charged with running a massive cyberfraud ring that stole 1 billion email addresses, then sent spam offering knockoff software products, the U.S. Department of Justice has said.
Cyber attacks on U.S. weapons programs and manufacturers are a "pervasive" problem that requires greater attention, the top U.S. arms buyer said recently, saying that he would add cybersecurity to the Pentagon's guidelines for buying weapons.
The computer server that transmitted and received Hillary Clinton's emails — on a private account she used exclusively for official business when she was secretary of state — traced back to an Internet service registered to her family's home in Chappaqua, New York, according to Internet records reviewed by The Associated Press.
A recently released report by the US Government Accountability Office has revealed that despite some improvements, the Federal Aviation Administration still needs to quash significant security control weaknesses that threaten the agency’s ability to ensure the safe and uninterrupted operation of the national airspace system.
- Page 1