This checklist can help you to build a penetration testing lab. To successfully set up your lab will require attention to detail, redundancy, and a littel bit of paranoia.
Most organizations are facing rising threats in their information security risk environment, but...
More than 200 organizations and 400 cybersecurity professionals from 29 European countries...
Cyber crime costs the global economy an estimated $400 billion a year, and as it grows in scale...
CurrentC, a merchant-backed mobile payment system in development to rival Google Wallet and Apple Pay, has been hacked during its pilot phase.
Cyber hits on ATMs are getting more frequent, but the authorities seem to be catching up: A man in the UK has been arrested in conjunction with a significant $2.6 million cash machine heist.
On my to-do list for some time has been to add support back into the Tr3Secure collection script to obtain the NTFS Change Journal ($UsnJrnl). This is a quick post about this functionality being added back to the collection script.
In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail account. Now hackers have learned the same trick.
In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspace in nation-state conflicts.
The Obama Administration has revealed that an unclassified computer network used by the US government was infiltrated by hackers.
American Airlines Flight 136 from LAX to London was delayed recently after someone in the vicinity picked an inappropriate name for their Wi-Fi hotspot.
Federal prosecutors have opened a criminal investigation after the FBI raided the home of a suspected second whistleblower who passed on secret government documents about a terror watch list.
Americans worry more about cyber theft than physical assault or burglary, according to a Gallup poll, which finds hacking atop the list of crimes people fear.
A coalition of security researchers has identified a Chinese cyberespionage group that appears to be the most sophisticated of any publicly known Chinese hacker unit and targets not only U.S. and Western government agencies but also dissidents inside and outside China.
What began as a scheme to defraud office supply stores has evolved into more ambitious crimes that have cost retailers around the country millions of dollars — and the Nigerian cyber criminals behind the fraud have also turned at-home Internet users into unsuspecting accomplices.
Information security experts say espionage-focused attackers, apparently operating from Russia, have been using phishing emails and malware in multi-stage attacks designed to evade detection and steal political and military secrets.
The University of Texas at San Antonio (UTSA) has been awarded a two-year, $400,000 grant from the Department of Homeland Security (DHS) to develop a DHS Scholars program, aimed toward building a future workforce for federal and private organizations addressing biological and digital threats.
IBM has a new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data.