From exposing the espionage ring that hacked the Dalai Lama to uncovering the commercial spyware being sold to repressive regimes, Citizen Lab has played a pioneering role in combing the Internet to illuminate covert landscapes of global surveillance and censorship. At the same time, it's also taken the role of an ambassador, connecting the Internet's various stakeholders from governments to security engineers and civil rights activists.
Rogue cellular towers and phony base stations long have been a tradition of researchers at Black...
The same tools that help millions of Americans work from home are being exploited by cyber...
A study from Webroot on security and PC gamers details the security perspective of players on their gaming systems. The study indicates that many gamers either disable their security or remove it altogether, thereby sacrificing protection to maximize system performance and leaving themselves vulnerable to gaming-focused malware and cyber attacks.
Researchers at Dell SecureWorks have uncovered what they believe to be a Chinese hacking group specifically focused on stealing source code from video game companies, either in order to crack or cheat at particular games or to use in competing products.
Gathering and understanding cyber intelligence is the work of BlackForest, a new open source intelligence gathering system developed by information security specialists at the Georgia Tech Research Institute (GTRI). By using such information to create a threat picture, BlackForest helps corporations, government agencies and nonprofit organizations battle increasingly-sophisticated threats to their networks.
A key to reducing cyber crime is getting victims — often major corporations — to cooperate with authorities, two top federal law enforcement officials said during visits to Pittsburgh.
Officials with the Tor privacy service have uncovered an attack that may have revealed identifying information or other clues of people operating or accessing anonymous websites and other services over a five-month span beginning in February.
If you’re making a phone call with your iPhone, you used to have two options: Accept the notion that any wiretapper, hacker or spook can listen in on your conversations, or pay for pricey voice encryption software. As of today there’s a third option.
In an interview with former National Security Agency Director General Keith Alexander, Foreign Policy's Shane Harris learned that Alexander plans to file “at least” nine patent applications — “and possibly more" — pertaining to technology for detecting network intruders.
While the word “forensics” might conjure up images of collecting hair or fingerprints from crime scenes, the scope of forensic science extends beyond the physical into almost any realm. If you need to discover the weather patterns in the past, you need some forensic meteorology. Forensic accounting uncovers book-cookery. And down in Australia, they're working on forensic text comparison in order to catch pedophiles.
High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.
Federal Chief Information Security Officers (CISOs) and information security executives face a number of challenges in today's dynamic, fast-paced environment. These challenges include advanced persistent threats, system vulnerabilities, and regulatory compliance, to name a few.
It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic debate over the tradeoffs between national security and individual privacy. It is time to start weighing the overall costs and benefits more broadly.
To string along suspected sex offenders, Bryan Montgomery carries out intimate conversations with them — sometimes lasting a year — while posing as a juvenile on social media. The job brings psychological stress, which Montgomery acknowledges.
The Russian Ministry of Internal Affairs (MVD) has offered a 3.9 million ruble (approximately $111,000) contract for technology that can identify the users of Tor, the encrypted anonymizing network used by Internet users seeking to hide their activities from monitoring by law enforcement, government censors, and others.
SiQuest Corporation has added a feature to its Internet Examiner Toolkit (IXTK). With the current release of Version 4.0.1407.2503, IXTK now forensically recovers evidence of “watched YouTube videos” from the Unallocated Space and browser cache repositories of computer hard drives, and the YouTube website directly.
The prospect that classified capabilities could be revealed in a criminal case has meant that the most sophisticated surveillance technologies are not always available to law enforcement because they are classified, current and former.