Like a corporation that doesn't like government intrusion, the Iranian government seems to to be turning from aggression within regulated industry to a new warfare technology that has fewer restrictions.
Hackers have for years bought and sold their secrets in a de facto gray market for zero-day...
The US government released a report yesterday warning of security threats facing modern aircraft...
Seven years after the Federal Aviation Administration first warned Boeing that its new...
Attribution ... does it matter? If you're gov, yeah (maybe). If you're a mom-and-pop, not so much. I would suggest that during both hunting and IR, attribution can be a distraction. Why is that?
If you're looking to reduce the pool of possible zero-day vulnerabilities that could potentially be used for criminal or state-sponsored breaches of computer and network security, throwing people and money at the problem isn't necessarily going to solve it. At least, that's the conclusion from a team of researchers at MIT, Harvard, and the security firm HackerOne.
The big search engines don't ignore the Deep Web because there's some impenetrable technical barrier that prevents them from indexing it - they do it because they're commercial entities and the costs and benefits of searching beyond their current horizons don't stack up.
The Simda botnet, known for spreading banking malware and dropping a backdoor on hundreds of thousands of machines worldwide, was taken down in a collaborative effort between international law enforcement bodies and private security and technology companies.
It worked on Hurricane Panda. Can APT30 and other organized cyberespionage groups also be convinced that an attack campaign isn't worth the trouble?
According to the IT and security professionals surveyed by ESG, better detection tools, better analysis tools, and more training on how to deal with incident response issues are the top ways to improve the efficiency and effectiveness of the information security staff.
Fourteen-year-old Domanik Green has been charged with felony offense against a computer system and unauthorized access. The eighth grader changed the wallpaper on a teacher's computer to a picture of two men kissing, after using an administrative-level password to accesss his middle school's network.
Even in the smallest police departments, today’s gumshoes are finding crime-solving clues in computer chips as criminals take a more technological approach to break the law.
Most organizations today focus on protecting their networks against malware, exploits, malicious websites and unpatched vulnerabilities. Unfortunately, there is a fundamental flaw with this approach: a malware-centric defense approach will leave you vulnerable to attacks that don’t leverage malware.
China has been actively diverting unencrypted Web traffic destined for its top online search service — Baidu.com — so that some visitors from outside of the country were unwittingly enlisted in a novel and unsettling series of denial-of-service attacks aimed at sidelining sites that distribute anti-censorship tools, according to research released this week.
Russian Hackers used a phishing email sent to the State Department as a jumping off point to infiltrate White House systems. Non-classified, but sensitive, data was taken. The hackers have also been able to reenter the State Department's system, despite efforts to keep them out.
Last December, Police in Massachusetts confronted a new, and growing, frontier in cyber terrorism when the CryptoLocker ransomware virus infected the department’s network, encrypting essential department files until the town paid a $500 bitcoin ransom.
A new group of international cybercrime fighters claimed one of its first kills Thursday, pulling the plug on malicious servers that hijacked at least 12,000 machines, most of them in the United States.
When a data breach occurs and personal information is stolen, where does it end up? Bitglass researchers decided to find out.
Deloitte Cyber Risk Service stages executive war games to show what might happen in the C-Suite after a breach.
A new executive order signed into law by the president has one online community up in arms, after its loose wording effectively ruled out donating to Edward Snowden and others.
The operator of an underground marketplace hosted within the Tor network has reported a flaw in Tor that he claims is being used for an ongoing denial of service attack on the site.
Google's Android security report shows that devices that only install apps from the Google Play store have fewer infections.
Google has taken the unprecedented decision to no longer recognize the certificate authorities (CAs) of .cn operator the China Internet Network Information Center (CNNIC), after a major security breach last month.
The charging of two federal agents has led to a heap of documents from the Silk Road drug trafficking case being unsealed, including the above chats about the massive January theft—an attack that was actually perpetrated by a Secret Service agent, Shaun Bridges. The 121-page document stash provides new insight into the details of how Bridges and DEA agent Carl Force ripped off the website.
The controversy surrounding former Secretary of State Hillary Clinton’s email has brought data destruction to the forefront of the national conversation. But now reports say Clinton “wiped the server,” deleting all emails. But how easy is it to permanently wipe data from servers or storage media?
The recent large-scale DDoS attacks against GitHub and anti-censorship group Greatfire.org are likely to signal the start of a major new attack campaign by China against foreign internet sites, according to Greatfire.
Taiwan wants to join a major anti-hacking drill conducted by the United States to strengthen cyber security ties with its staunchest ally, its vice premier said on Monday, a move which would help safeguard against constant targeting by hackers in rival China.
On Friday, GitHub, the open-source software code collaboration site, said they were experiencing the largest DDoS (distributed denial of service) attack in github.com's history, according to their blogpost.
- Page 1