Cybersecurity

Early this week, the U.S. Supreme Court ruled in favor of convicted sex offender Lester Packingham, who argued that the state of North Carolina’s ban of registered sex offenders from all social networking sites violated his First Amendment rights.
Associate Editor
|
2:14pm
6.23.2017
Facebook inadvertently exposed the personal details of content moderators to suspected terrorist users, according to a report by The Guardian. The security lapse affected more than 1,000 workers across 22 departments at Facebook who used the company...
by Olivia Solon, The Guardian US
11:14am
6.19.2017
Advertisement
The Shadow Brokers announced late last month that they would be offering a paid monthly “dump,” which is expected to include some of the stolen hacking tools and zero-day exploits that make the hacking group infamous. Who will these tools and...
by
Associate Editor
|
1:32pm
6.8.2017
New security concerns and security risks have stemmed from the newest wave of internet-connected toys, including the Hello Barbie, which records two-way conversations with children and stores them on a cloud-based server. One recent study examined...
Associate Editor
|
12:56pm
5.26.2017
Hundreds of thousands of computers in approximately 150 countries were held hostage last weekend after the so-called WannaCry ransomware exploited a Microsoft vulnerability that had been patched two months prior. Not all users installed the patch,...
Associate Editor
|
12:26pm
5.19.2017
Advertisement
A self-replicating phishing scam executed earlier this month used Google's third-party app system against it by creating a phony application that spoofed the name "Google Docs" and tricked users into giving the app access to their contacts.
Associate Editor
|
12:59pm
5.12.2017
U.S. President Donald Trump signed an executive order on Thursday to bolster the government's cybersecurity and protect critical infrastructure from cyberattacks, marking his first significant action to address what he has called a top priority.
by Dustin Volz, Reuters
12:28pm
5.12.2017
A large cyberattack crippled computer systems at hospitals across England on Friday, with appointments canceled, phone lines down and patients turned away. Britain's National Health Service said hospitals across England were hit by an apparent "...
by Associated Press
11:53am
5.12.2017
Advertisement
A vigilante hacker has created a botnet called BrickerBot, which infects devices and destroys, or “bricks,” them, rendering them completely useless. The hacker claims his two main goals are to raise awareness of security flaws and destroy unsecured...
Associate Editor
|
1:38pm
5.4.2017
In 2015, a group of inmates at an Ohio prison executed an unbelievable plot—they managed to build two computers, connect to the prison network system, access the internet and plot the beginnings of a cybercrime spree.
Associate Editor
|
1:01pm
4.27.2017
Advertisement
Advertisement
A case study of the cybercrime network known as Avalanche, and of the groundbreaking law enforcement effort that ultimately took it down in December 2016, gives researchers a look at how the cybercriminal underground will operate in the future, and...
by Frank J. Cilluffo, Alec Nadeau and Rob Wainwright, The Conversation
10:21am
4.26.2017
A federal judge on Friday handed down the longest sentence ever imposed in the U.S. for a cybercrime case to the son of a member of the Russian Parliament convicted of hacking into more than 500 U.S. businesses and stealing millions of credit card...
by Martha Bellisle, Associated Press
11:03am
4.24.2017
Advertisement
As the physical world is becoming increasingly connected to the virtual world, the lines between cybersecurity and “real” security are becoming blurred. Recent cases of interference with emergency alarms and 911 systems highlight the threat to...
Associate Editor
|
11:57am
4.20.2017
Researchers have found that partial similarities between prints are common enough that the fingerprint-based security systems used in mobile phones and other devices can be more vulnerable than previously thought.
by Michigan State University
10:27am
4.17.2017
A man alleged to be a major Russian spam boss has been detained in Spain at the request of U.S. authorities, an arrest that set cybersecurity circles abuzz after a Russian broadcaster raised the possibility of a link to the U.S. presidential...
by Aritz Parra and Raphael Satter, Associated Press
9:13am
4.11.2017
Advertisement
An anonymous group claims to have access to as many as 750 million Apple accounts, and are threatening to remotely wipe Apple devices unless they receive a $700,000 ransom from the company. Apple has responded saying their systems were not breached.
Associate Editor
|
12:30pm
4.6.2017
Not so long ago, thieves who wanted to steal the entire contents of an ATM had to blow it up. Today, a more discreet sort of cash-machine burglar can walk away with an ATM’s stash and leave behind only a tell-tale 3-inch hole in its front panel.
by Andy Greenberg, Wired
11:23am
4.4.2017
Nokia researchers said threat actors are shifting from traditional to mobile malware after spotting an 83 percent uptick in the increase of smartphone infections in the second half of 2016. Nokia released its Threat Intelligence Report on Monday.
by Robert Abel, SC Media
10:57am
3.29.2017
Advertisement
The FBI is investigating possible Russian interference in the 2016 U.S. presidential election, FBI Director James Comey told Congress today. Comey also said there is no evidence that former President Barack Obama "tapped" President Donald Trump's...
Senior Science Writer
|
11:38am
3.20.2017
With virtually everyone having a computer and internet access, each day more individuals, businesses and government entities potentially leave themselves vulnerable to cybercrime. Unless a computer and its network utilize very sophisticated security...
by John J. Barbara
9:10am
3.20.2017
Advertisement
Advertisement
Two Russian intelligence agents and a pair of hired hackers have been charged in a devastating criminal breach at Yahoo that affected at least a half billion user accounts, the Justice Department said Wednesday in bringing the first case of its kind...
by Eric Tucker, Associated Press
9:04am
3.16.2017
Sound waves could be used to hack into critical sensors in a broad array of technologies including smartphones, automobiles and medical devices, according to new research. With a $5 speaker researchers fooled hardware sensors called accelerometers...
by University of Michigan
11:46am
3.15.2017
Advertisement
Despite the U.S. government’s steps to tackle cybersecurity threats, hackers continue to target federal agencies and they experienced tens of thousands of incidents last year, according to a White House report.
by Nafeesa Syeed, Bloomberg
9:56am
3.13.2017
How dangerous is a bug like Cloudbleed? What should users do to secure their data? The answers to these questions lie in understanding the nature of security bleeds, and in the words of cybersecurity experts who know the world of web data inside and...
Associate Editor
|
12:52pm
3.9.2017
Oil and gas companies, including some of the most celebrated industry names in the Houston area, are facing increasingly sophisticated hackers seeking to steal trade secrets and disrupt operations, according to a newspaper investigation.
by Associated Press
10:04am
3.6.2017
Advertisement
Cloudflare revealed a serious bug in its software today that caused sensitive data like passwords, cookies and authentication tokens to spill in plaintext from its customers’ websites. The announcement is a major blow for the content delivery...
by Kate Conger, TechCrunch
10:28am
2.24.2017
Cybersecurity researchers have developed a new form of ransomware that was able to take over control of a simulated water treatment plant. They designed the simulation to highlight vulnerabilities in the control systems used to operate some...
by Georgia Institute of Technology
10:50am
2.16.2017
The Cockrell Hill Police Department reported last month that a server containing documents, videos and photos dating back to 2009 was hit by "OSIRIS," a ransomware variant, on Dec. 12. The attackers wanted roughly $4,000 worth of bitcoin to unlock...
by AJ Vicens, Mother Jones
10:13am
2.16.2017
Advertisement
While AI is not anywhere close to being perfect, experts say that machine learning, adaptive intelligence and massive data models—that can spot hacking much faster than any human—are here to help.
by John Brandon, CSO
10:50am
2.3.2017
The FBI on Monday defended its decision to withhold documents on how it unlocked an iPhone used by one of the San Bernardino, California, shooters, saying the information could be exploited by "hostile entities" if released to the public.
by Eric Tucker, Associated Press
11:02am
2.1.2017
Advertisement
Advertisement
At least 40 new but unofficial "alternative" accounts for federal agencies have begun spreading across Twitter. Legal experts said the Justice Department could prosecute such tweeters under federal hacking laws, but the FBI so far was not involved.
by Ted Bridis, Associated Press
10:32am
1.27.2017
The biggest customer base for phone cracking technology is likely law enforcement, but this sort of tech is also in the hands of banks. Private companies like banks, which have different forms of oversight than the police, use phone cracking...
by Joseph Cox, Motherboard
12:12pm
1.18.2017
Advertisement
Fake fingerprints and other forms of biometric spoofing pose serious challenges to the security community. However, new technology has extra keen sensors that can detect whether fingerprints and other biometric security data come from a living...
by Dave Roos, Seeker
12:18pm
1.17.2017
Cellebrite, the Israel-based mobile and digital forensics giant, was itself a victim of a security information breach, the company announced today.
Senior Science Writer
|
11:46am
1.12.2017
The proliferation of mobile devices with high-quality cameras and social media sites where photographs can be easily posted is raising the risk of personal information being leaked, such as fingerprints.
by AFP-JIJI
11:30am
1.12.2017
Advertisement
The National Institute of Standards and Technology (NIST) is officially asking the public for help heading off a looming threat to information security: quantum computers, which could potentially break the encryption codes used to protect privacy in...
by NIST
10:27am
12.28.2016
Donald Trump is holding firm to his skepticism of the huge intelligence apparatus he's about to inherit, doubting the CIA conclusion that Russia tried to hack its way into tipping the U.S. election in his favor.
by Eric Tucker, Associated Press
10:54am
12.13.2016
In an astonishing statement on Wednesday, Trump again absolved Russia from responsibility for the hacking of the DNC and the Clinton campaigns.
by Homeland Security News Wire
10:32am
12.12.2016
Advertisement
A sweeping cyberspace surveillance bill giving British police and investigators unprecedented access to personal information became law through royal assent in the United Kingdom last week.
Senior Science Writer
|
11:52am
12.5.2016
To protect and continue to expand the digital economy, the next U.S. president must strengthen collaboration between the public and private sectors before, during and after cybersecurity events, according to a new report released today by a blue...
by NIST
11:06am
12.5.2016
Advertisement
Advertisement