Former Speaker for the House Newt Gingrich declared in a tweet that: “With the Sony collapse America has lost its first cyberwar. This is a very very dangerous precedent.” This is the weirdness of modernity.
For more than a decade, a powerful app called Metasploit has been the most important tool in the...
Threats of violence against movie theaters. The New York premiere of "The Interview"...
The Institute of Technology at the University of Washington Tacoma, in...
If we are lucky, the successful terrorist cyberattack against Sony Pictures will shock the U.S. government into more vigorously defending its people and businesses from hackers. If we are unlucky, that turning point won’t come until somebody uses cyber weapons to kill Americans, an attack that many experts believe is inevitable.
Over the past few years, there have been several high-profile cyber crimes against large companies, including Target and Home Depot, that have resulted in little, if no, consequences for the criminals. So, how often do hackers get caught?
Since last month's FBI shutdown of online drug marketplace Silk Road, the site now known as the leading online black market for illegal drugs - Evolution Marketplace - has seen explosive growth in its offering of drugs and other illegal items.
Federal IT and security professionals can take a few tips from law enforcement and learn to secure technological "crime scenes," assess the damage and report on how an attack was carried out.
Security researchers have discovered a backdoor in Android devices sold by Coolpad, a Chinese smartphone manufacturer. The “CoolReaper” vuln has exposed over 10 million users to potential malicious activity. Palo Alto Networks reckons the malware was “installed and maintained by Coolpad despite objections from customers”.
A "spearfishing" attack aimed at US-based nonprofit Internet Corporation for Assigned Names and Numbers (ICANN) hooked staff members with emails crafted to appear as though they were sent from peers using "icann.org" addresses, according to a blog post.
A botched cyberattack aimed at unmasking Syrian dissidents has experts worried that the Islamic State group is adding malicious software to its arsenal. Internet watchdog Citizen Lab says an attempt to hack into systems operated by dissidents within the self-styled caliphate could be the work of hackers affiliated with the Islamic State group.
Southern Methodist University’s cyber warrior, Fred Chang, has been named an Information Security Magazine “Security 7” award winner, which annually spotlights information security leaders at the top of their profession.
Credit card fraud and identify theft are serious problems for consumers and industries. Though corporations and individuals work to improve safeguards, it has become increasingly difficult to protect financial data and personal information from criminal activity. Fortunately, new insights into quantum physics may soon offer a solution.
Dakota county is creating the first local Electronic Crimes Task Force based in Minnesota. Ten agencies — nine city police departments and the sheriff’s office — will participate in the group, which will begin operating next month.
Google has blacklisted more than 11,000 domains involved in the latest malware campaign from SoakSoak.ru. But, the impact is apparently much larger: it seems to be affecting most hosts across the WordPress hosting spectrum, according to researchers.
Criminal hackers are actively exploiting the critical shellshock vulnerability to install a self-replicating backdoor on a popular line of storage systems, researchers have warned.
Seventy-six percent of organizations in the U.S. and U.K. have suffered a DNS attack, with 49 percent experiencing one in the past 12 months, according to Cloudmark.
The Federal Bureau of Investigation has warned U.S. businesses to be on the alert for a sophisticated Iranian hacking operation whose targets include defense contractors, energy firms and educational institutions, according to a confidential agency document.
SiQuest was voted "Industry Innovator 2014" by SC Magazine under the category of Analysis and Testing for the evaluation and performance of their new Internet Examiner® Toolkit forensic software.