It’s the question of the moment inside the murky realm of cybersecurity: Just who — or what — is the Syrian Electronic Army? The hacking group that calls itself the S.E.A. struck again, this time breaking into the Twitter accounts and blog headlines of The Financial Times.
A privacy watchdog group is going after Snapchat for deceiving users about self-destructing...
Three months after hackers working for a cyberunit of China’s People’s Liberation Army went...
In the wake of the AP scandal, in which federal investigators obtained the phone records of journalists using only a subpoena, four lawmakers have introduced legislation in the House that would prevent federal agencies from seizing any phone records without a court order.
Valentin Boanta, sitting in his jail cell, proudly explains the device he has invented which, he says, could make the world's ATMs impregnable even to tech-savvy criminals like himself. Boanta, 33, is six months into a five-year sentence for supplying gadgets an organized crime gang used to conceal ATM skimmers, which can copy data from an unsuspecting ATM user's card so a clone can be created.
The four British Lulzsec hackers — Mustafa "tflow" al-Bassam, Ryan "kayla" Ackroyd, Jake "topiary" Davis, and Ryan "ViraL" Cleary — were sentenced to between 20 and 32 months in jail for crimes committed during Lulzsec's 50 day hacking spree in 2011. The handling of charges of conspiracy to commit fraud brought against all four was also an important issue.
Hackers have become adept at modifying malicious code to avoid detection by signature-based security tools so that even well-known malware such as the Poison Ivy Remote Access Tool can slip past defenses. But even stealthy, well-disguised threats leave tracks that can be discovered through analysis of network traffic.
Carbon Black and VirusTotal has announced an official partnership to help improve malware detection as part of the Carbon Black Alliance. Well known in the information security world, VirusTotal is a free, online service that analyzes files and URLs, enabling the identification of viruses, worms, trojans and other kinds of malicious content.
Mobily, a Saudi Arabian telecommunications company with 4.8 million subscribers, is working on a way to intercept encrypted data sent over the Internet by Twitter, Viber and other mobile apps, a security researcher has said. Moxie Marlinspike, the pseudonymous cryptographer, said he learned of the project after receiving an email from company officials.
Attorney General Eric Holder became the White House’s highest ranking official to support sweeping privacy protections requiring the government, for the first time, to get a probable-cause warrant to obtain email and other content stored in the cloud. Holder, who was speaking at a Justice Department oversight hearing, said that warrants are unnecessary for non-criminal investigations.
The White House sought to defuse controversy over its handling of last year's killing of four Americans in Benghazi, releasing emails that show how Obama administration officials presented a scrubbed-down version of the attacks to the public.
The Internet Crime Complaint Center (IC3) has released the 2012 Internet Crime Report — a summary of reported fraudulent activity, including data and statistics. In 2012, the IC3 received and processed 289,874 complaints, averaging more than 24,000 complaints per month. Unverified losses reported to IC3 rose 8.3 percent over the previous year.
Computer hackers who considered themselves to be "latter-day pirates" led sophisticated cyber attacks on websites and systems of major institutions including the CIA, Sony, the FBI and Nintendo, a court has heard. Britons Ryan Ackroyd, Jake Davis, Mustafa Al-Bassam and Ryan Cleary were "hactivists" with the LulzSec collective.
Major information security event Black Hat has announced that General Keith Alexander — Commander, U.S. Cyber Command/Director, National Security Agency/Chief, Central Security Service (NSA/CSS) — will present the Day One keynote address at Black Hat USA 2013 in Las Vegas this July.
Researchers from North Carolina State University have developed a software algorithm that detects and isolates cyber attacks on networked control systems – which are used to coordinate transportation, power and other infrastructure across the United States.
A breach of security at two payment card processing companies in India that led to heists at cash machines around the world has reopened questions on the risks of outsourcing sensitive financial services to the Asian nation. Any perception that data may be less safe in India is unwelcome for an industry that faces an undercurrent of hostility for taking away jobs in the West, home to most of its clients.
The FBI last month gave temporary security clearances to scores of U.S. bank executives to brief them on the investigation into the cyber attacks that have repeatedly disrupted online banking websites for most of a year. The extraordinary clearances reflect some action after years of talk about the need for increased cooperation between the public and private sectors on cybersecurity.
The central organizer of a worldwide conspiracy to manipulate stock prices through a botnet network of virus-controlled computers was sentenced today in Trenton federal court to 71 months in prison. Christopher Rad, 44, of Cedar Park, Texas, was previously convicted, following a nine-day jury trial.