A new report by McAfee sheds light on the underground world of online gambling. It identifies the proliferation of online casinos, an industry set to grow nearly 30 percent over the next three years, and how their use is fuelling cyber crime by making it easy to “cash in” on illegal activities.
The important role OpenSSL plays in securing the Internet has never been matched by the...
Verizon released its Verizon Data Breach Investigations report (DBIR) recently, showing both an...
Following a public comment period and review, NIST has removed a cryptographic algorithm from its draft guidance on random number generators. Before implementing the change, NIST is requesting final public comment.
Apple has patched versions of its iOS and OS X operating systems to fix yet another extremely critical cryptography vulnerability that leaves some users open to surreptitious eavesdropping.
Criminals use a range of tactics from simple email scams to social-media threats to sophisticated malware, but only 11 percent of U.S. businesses have adopted industry-standard cybersecurity measures.
For all the talk about how something should be done to fix OpenSSL so that a Heartbleed situation is never again repeated, there has been little to no concrete action so far.
Sometimes, when a computer forensics expert is dissecting a suspect’s computer, the most important question to answer is this: “Am I looking at the original hard-drive, with all of its incriminating evidence, or has that drive been swapped out surreptitiously for a new drive, which will not contain the evidence that I’m hoping to find?”
Canadian police confirmed an arrest has been made in the Netherlands in the case of a Canadian teenager who was blackmailed into exposing herself in front of a webcam. The 15-year-old later committed suicide after detailing her harassment on a YouTube video watched by millions around the world.
The drop in the crime rate over the past decade is misleading, according to a Hertfordshire, UK police chief. He argues that criminal behavior has moved online, where much of it goes either unreported or undetected.
Cyber crime and securities and commodities fraud will be targeted by new teams of Chicago prosecutors under a reshuffle ordered by U.S. Attorney Zach Fardon.
For years, people have characterized the ineffectiveness of the online certificate status protocol (OCSP) as Exhibit A in the case that the Internet's secure sockets layer and transport layer security (TLS) protocols are hopelessly broken. Until now, no one paid much attention.
New Verizon 2014 Data Breach Investigations Report identifies nine types of attack patterns that accounted for 93 percent of security incidents in the past decade. Cyber criminals and cyber spies mostly log in to steal data.
The Secret Service and FBI are investigating an increasing number of attacks on U.S. retailers’ data. The Secret Service points to Agent Matt O’Neill's investigation that began in 2010 as an example of how they go about solving such crimes.
In June 2011, when customers of now-bankrupt bitcoin exchange Mt. Gox agitated for proof that the Tokyo-based firm was still solvent after a hacking attack, CEO Mark Karpeles turned to the comedy science fiction novel "The Hitchhikers Guide to the Galaxy."
A new global DDoS attack report from Akamai shows that in Q1 DDoS attackers relied less upon traditional botnet infection in favor of reflection and amplification techniques.
Police officers trying to find out who was behind a fake Twitter account set up in the name of Peoria's mayor have raided a home, seizing computers and phones and hauling several people in to be questioned.
A range of crucial satellite systems manufactured by some of the world’s biggest government contractors contain severe vulnerabilities that could be exploited to disrupt military operations and flight-safety communications, researchers have warned.