In an interview with former National Security Agency Director General Keith Alexander, Foreign...
Three Israeli defense contractors responsible for building the “Iron Dome” missile shield...
If you’re making a phone call with your iPhone, you used to have two options: Accept the notion that any wiretapper, hacker or spook can listen in on your conversations, or pay for pricey voice encryption software. As of today there’s a third option.
Muneeb Akhter is under investigation after admitting that he inflated the value of gift cards for companies including K-Mart, Shell Gas, Whole Foods, Starbucks and Dunkin Donuts, all without spending any money to do it.
High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.
Cookies are an essential part of the way the web works and occupy a pivotal position in the online privacy arms race. Organizations who want to track and profile people give them cookies and users who don't want to be tracked disable or delete them. But what if there was a cookie you couldn't delete, and what if the steps you took to guard your privacy made you easier to track?
Federal Chief Information Security Officers (CISOs) and information security executives face a number of challenges in today's dynamic, fast-paced environment. These challenges include advanced persistent threats, system vulnerabilities, and regulatory compliance, to name a few.
It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic debate over the tradeoffs between national security and individual privacy. It is time to start weighing the overall costs and benefits more broadly.
Every law firm can run into incidents of employee misconduct, data breaches, and intellectual property theft. In the age of modern technology, data breaches, insider trading, and other security problems require extensive technological forensics.
MediaClone, Inc. has released its Multi-Channel SAS/SATA-3 and USB 3.0 Erase and Format Unit — the SuperWiper. This is an industrial built unit with desktop style, 8 open insertion trays, extremely fast speed, and an eight inch Touch Screen color LCD display mounted on an elevated display pad.
To string along suspected sex offenders, Bryan Montgomery carries out intimate conversations with them — sometimes lasting a year — while posing as a juvenile on social media. The job brings psychological stress, which Montgomery acknowledges.
The Russian Ministry of Internal Affairs (MVD) has offered a 3.9 million ruble (approximately $111,000) contract for technology that can identify the users of Tor, the encrypted anonymizing network used by Internet users seeking to hide their activities from monitoring by law enforcement, government censors, and others.
Cybersecurity is being pushed in two directions. On the one hand, the growing complexity of information systems and the onslaught of threats facing them are putting a premium on speed. Automation is the future of security.
SiQuest Corporation has added a feature to its Internet Examiner Toolkit (IXTK). With the current release of Version 4.0.1407.2503, IXTK now forensically recovers evidence of “watched YouTube videos” from the Unallocated Space and browser cache repositories of computer hard drives, and the YouTube website directly.
The prospect that classified capabilities could be revealed in a criminal case has meant that the most sophisticated surveillance technologies are not always available to law enforcement because they are classified, current and former.
Recently, a hacker who's been campaigning to make a point about Apple security by playing fast and loose with the now widely-accepted definition of "backdoor" struck gold when journalists didn't do their homework and erroneously reported a diagnostic mechanism as a nefarious, malfeasant, secret opening to their private data.
Have the UK police successfully broken anonymity on the internet? They certainly seemed to imply as much when the National Crime Agency proudly announced recently that it had made 660 arrests after an operation to identify people viewing indecent images of children online. The announcement raises questions about just how anonymous it is possible to be online.