When the man who called himself “Mo” made a series of threats to detonate bombs last year, police had to scramble every time. Mo remained elusive for months, communicating via email, video chat and an Internet-based phone service without revealing his true identity or location, court documents show. So with no house to search or telephone to tap, investigators turned to a new kind of surveillance tool delivered over the Internet.
Chinese hackers eavesdropped on the computers of five European foreign ministries before last...
An online crime kingpin arrested in October and charged with creating and distributing the...
Major technology companies, stung by revelations that the U.S. government collects people's...
Holding the number one spot in the world for the second consecutive year, a Northrop Grumman Corporation team of cyber engineers won the overall "grand champion" title in the Defense Cyber Crime Center's (DC3's) eighth annual Digital Forensics Challenge.
Thirteen defendants pleaded guilty in federal court in San Jose on Friday to charges related to their involvement in the cyber attack of PayPal’s website as part of the group Anonymous. One of the defendants also pleaded guilty to the charges arising from a separate cyber attack on the website of Santa Cruz County.
The Microsoft Digital Crimes Unit has successfully disrupted a rampant botnet in collaboration with Europol’s European Cybercrime Centre (EC3), the Federal Bureau of Investigation (FBI) and leaders in the technology industry, including A10 Networks Inc.
Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents.
The relevance of text messages continues to grow as an important component of e-discovery. At the same time, the diversity and complexity of the options available for texting is steadily increasing. While text messaging may at times be used as a quick and informal way to communicate, today these messages have legal implications across a wide range of civil cases.
Security Innovation, a company that specializes in application and crypto security, has announced availability of its NTRU public key cryptography system for free use in the open-source software community.
As security researchers look into a Linux worm that's gaining steam by targeting embedded devices, the lessons they learn could prove instructive for the industry as it seeks to protect the Internet of Things.
Another week, another huge Bitcoin theft. This time, it’s the customers of Tor-based underground market Sheep Marketplace who have been left with empty wallets. If the market’s administrators are to be believed, a vendor is behind the theft. But there are many that don’t believe the explanation, and suspect the operators of Sheep Marketplace of having executed a clever scam.
Earlier this year, researchers say, someone mysteriously hijacked internet traffic headed to government agencies, corporate offices and other recipients in the U.S. and elsewhere and redirected it to Belarus and Iceland, before sending it on its way to its legitimate destinations. They did so repeatedly over several months. This may not be the first time it has occurred — just the first time anyone has noticed.
JPMorgan Chase & Co is warning some 465,000 holders of prepaid cash cards issued by the bank that their personal information may have been accessed by hackers who attacked its network in July.
The Washington Post has added another noteworthy finding to the growing pile of information leaked by former NSA contractor Edward Snowden: the NSA is collecting nearly five billion cellphone location records per day from across the world. The Post reports that this initiative allows the NSA to track individuals and map relationships "in ways that would have been previously unimaginable."
Every now and then, security researchers come across a server used by hackers to store stolen account credentials. The latest instance of this has been flagged by Daniel Chechik and Anat (Fox) Davidi of Trustwave’s SpiderLabs, who have discovered a stash login credentials for nearly two million online accounts.
With the average cost of a cyber attack in the UK exceeding $1.5 million, employees should be more vigilant than ever about clicking on a link or attachment in unsolicited emails. But social engineering still works, and it turns out that breaking news fronts the email attacks that employees are most vulnerable to.
German police say they have arrested two people and seized illegally generated bitcoins worth more than 700,000 euros ($950,000) in an investigation of computer fraud. The Federal Criminal Police Office said it staged searches in an investigation of three people suspected of manipulating existing malware and spreading it over the Internet, creating a remotely controlled network of compromised computer systems.
A U.S. senator has asked 20 of the world's biggest automakers for information on how they secure their vehicles from cyber attacks, in light of reports by security experts who say they have identified ways to hack into cars.