FBI Director James Comey has warned in stark terms against the push by technology companies to encrypt smartphone data and operating systems, arguing that murder cases could be stalled, suspects could walk free and justice could be thwarted by a locked phone or an encrypted hard drive.
Security researchers have warned of a serious security flaw in Android which could ...
US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola...
Staying abreast of global trends in the digital world, educators in Richmond and Columbia counties are working to create new coursework that will train high school students to protect computer networks from security threats.
A hacker obtained nude photographs of a California model through Apple's iCloud and gave her two choices: pay up or have your private photos distributed to the world. The hacker reportedly bragged about hacking into celebrity accounts and leaking nude photos before demanding $900 from the model or else he'd 'ruin her modeling career.'
A new forensics certification, the GIAC Network Forensic Analyst, validates that professionals who hold this credential are qualified to perform examinations employing network forensic artifact analysis and demonstrate an understanding of network forensics, normal and abnormal conditions for common network protocols, the process and tools used to examine device and system logs, wireless communication, and encryption protocols.
Bob Foreman’s architecture firm was the victim of an age-old fraud that has found new life now that most corporate phone lines run over the Internet. Hackers had broken into the phone network of the company, Foreman Seeley Fountain Architecture, and routed $166,000 worth of calls from the firm to premium-rate telephone numbers in Gambia, Somalia and the Maldives.
Admins of sites that run Drupal 7 are advised to update to the latest version of the platform — version 7.32 — because it fixes a critical SQL injection vulnerability that can ultimately lead to site hijacking and data theft.
The Russian high-tech crime market for 2014 is showing ever-increasing sophistication, with criminals creating shadow worlds of illegal activity, exploiting new financial theft techniques and incorporating mobile attacks more often.
The cost and regularity of digital attacks against business continue to rise steadily, with no obvious end to the assault on the horizon.
The U.S. Federal Bureau of Investigation said on Wednesday that hackers it believes to be backed by the Chinese government have recently launched attacks on U.S. companies.
Across the nation, private foundations are increasingly being tapped to provide police with technology and weaponry that — were it purchased with public money — would come under far closer scrutiny.
It’s easy to see how forensics used during a cyberattack investigation are similar to those used in a physical crime scene.
The sophisticated electronic components that are making modern cars safer, greener, and smarter are also making them dangerously vulnerable to cyber attacks.
Digital forensics firm Cellebright has moved from copying contacts on mobile phones to digital forensics, helping police collar the bad guys along the way.
In an interview with ISMG, Garet Moravec, an independent security consultant, offers a hypothetical example of thwarting Chinese hackers trying to breach a defense contractor's systems to pilfer designs on a jet fighter by using a honeypot, a trap containing fake information that's designed to look like part of a network.
Banks are fighting an uphill battle to protect themselves and their client accounts from cyber attacks, and the sometimes careless use of social media by customers and staff isn't making the fight any easier.
From the researchers that brought you BEAST and CRIME comes another attack against Secure Sockets Layer (SSL), one of the protocols that's used to secure Internet traffic from eavesdroppers both government and criminal.