The Washington Post has added another noteworthy finding to the growing pile of information leaked by former NSA contractor Edward Snowden: the NSA is collecting nearly five billion cellphone location records per day from across the world. The Post reports that this initiative allows the NSA to track individuals and map relationships "in ways that would have been previously unimaginable."
Every now and then, security researchers come across a server used by hackers to store stolen...
With the average cost of a cyber attack in the UK exceeding $1.5 million, employees should be...
JPMorgan Chase & Co is warning some 465,000 holders of prepaid cash cards issued by the bank that their personal information may have been accessed by hackers who attacked its network in July.
A U.S. senator has asked 20 of the world's biggest automakers for information on how they secure their vehicles from cyber attacks, in light of reports by security experts who say they have identified ways to hack into cars.
The hacker who shook the US intelligence machinery and had world leaders railing against Washington for spying on them picked up crucial skills in India. Edward Snowden, the National Security Agency contractor-turned-whistleblower, spent a week in New Delhi training in core Java programming and advanced ethical hacking. It's this training that got him certified as an EC-Council Certified Security Analyst (ECSA).
A new point-of-sale (POS) skimmer, used for lifting credit card details and PIN data at retail locations, has gone on sale for thousands of dollars on semi-private underground crime forums. The skimmer is notable in that it can be installed and removed in the blink of an eye.
Computer scientists have developed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection.
U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI) teamed with 10 foreign law enforcement agencies to seize hundreds of domain names that were illegally selling counterfeit merchandise online to unsuspecting consumers. The 706 domain names seized were set up to dupe consumers into unknowingly buying counterfeit goods as part of the holiday shopping season.
Passwords remain the primary means for online authentication and must be protected when stored on a server. Encryption is an option, but it has an inherent weakness in this application because the server authenticating the password must have the key to decrypt it. Hashing is a better option, especially with the judicious use of salt.
A Wisconsin man was sentenced on Monday to two years probation after he admitted taking part in a cyber attack sponsored by the hacker group Anonymous against Kansas conglomerate Koch Industries in February 2011, federal prosecutors said.
The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document.
Researchers have discovered a Linux worm capable of infecting a wide range of home routers, set-top boxes, security cameras, and other consumer devices that are increasingly equipped with an Internet connection.
From a cybercrime perspective, the opportunities are boundless: Seemingly everything has a computer in it, cars and pacemakers included. It’s almost certain that the sophistication of exploits and attacks will increase, and that new exploit modes will surface with the ongoing computing and mobility revolution.
Up to five Nissan North America information security employees could also do double duty as reserve sheriff’s deputies, assisting investigators on forensics cases as part of a first-ever arrangement between the automaker and the Williamson County Sheriff’s Department.
Historically, AutoCAD malware is very rare, although not completely unheard of. A new bug is now making the rounds, targeting these graphics and engineering platforms with exploits targeting old vulnerabilities. The goal is industrial espionage, but it could take a multi-layer infection to do it.
Researchers have proven that wireless communications can be made more secure through a novel approach based on information theory. Their strategy for defeating eavesdroppers, which focuses on the so-called physical layer of communications systems, offers advantages over higher-level techniques such as encryption.
Hardware attacks aren’t exclusive to state-sponsored operations. Criminal organizations could be interested to commercialize counterfeiting products or steal sensitive information to resell. Asian countries are the main areas where manufacturers have production plants. But cheap production costs could hide serious threats.