Valentin Boanta, sitting in his jail cell, proudly explains the device he has invented which, he says, could make the world's ATMs impregnable even to tech-savvy criminals like himself. Boanta, 33, is six months into a five-year sentence for supplying gadgets an organized crime gang used to conceal ATM skimmers, which can copy data from an unsuspecting ATM user's card so a clone can be created.
The four British Lulzsec hackers — Mustafa "tflow" al-Bassam, Ryan "kayla" Ackroyd, Jake "...
Hackers have become adept at modifying malicious code to avoid detection by signature-based...
In the wake of the AP scandal, in which federal investigators obtained the phone records of journalists using only a subpoena, four lawmakers have introduced legislation in the House that would prevent federal agencies from seizing any phone records without a court order.
Carbon Black and VirusTotal has announced an official partnership to help improve malware detection as part of the Carbon Black Alliance. Well known in the information security world, VirusTotal is a free, online service that analyzes files and URLs, enabling the identification of viruses, worms, trojans and other kinds of malicious content.
Attorney General Eric Holder became the White House’s highest ranking official to support sweeping privacy protections requiring the government, for the first time, to get a probable-cause warrant to obtain email and other content stored in the cloud. Holder, who was speaking at a Justice Department oversight hearing, said that warrants are unnecessary for non-criminal investigations.
The White House sought to defuse controversy over its handling of last year's killing of four Americans in Benghazi, releasing emails that show how Obama administration officials presented a scrubbed-down version of the attacks to the public.
The Internet Crime Complaint Center (IC3) has released the 2012 Internet Crime Report — a summary of reported fraudulent activity, including data and statistics. In 2012, the IC3 received and processed 289,874 complaints, averaging more than 24,000 complaints per month. Unverified losses reported to IC3 rose 8.3 percent over the previous year.
Computer hackers who considered themselves to be "latter-day pirates" led sophisticated cyber attacks on websites and systems of major institutions including the CIA, Sony, the FBI and Nintendo, a court has heard. Britons Ryan Ackroyd, Jake Davis, Mustafa Al-Bassam and Ryan Cleary were "hactivists" with the LulzSec collective.
Major information security event Black Hat has announced that General Keith Alexander — Commander, U.S. Cyber Command/Director, National Security Agency/Chief, Central Security Service (NSA/CSS) — will present the Day One keynote address at Black Hat USA 2013 in Las Vegas this July.
Researchers from North Carolina State University have developed a software algorithm that detects and isolates cyber attacks on networked control systems – which are used to coordinate transportation, power and other infrastructure across the United States.
A breach of security at two payment card processing companies in India that led to heists at cash machines around the world has reopened questions on the risks of outsourcing sensitive financial services to the Asian nation. Any perception that data may be less safe in India is unwelcome for an industry that faces an undercurrent of hostility for taking away jobs in the West, home to most of its clients.
The FBI last month gave temporary security clearances to scores of U.S. bank executives to brief them on the investigation into the cyber attacks that have repeatedly disrupted online banking websites for most of a year. The extraordinary clearances reflect some action after years of talk about the need for increased cooperation between the public and private sectors on cybersecurity.
The central organizer of a worldwide conspiracy to manipulate stock prices through a botnet network of virus-controlled computers was sentenced today in Trenton federal court to 71 months in prison. Christopher Rad, 44, of Cedar Park, Texas, was previously convicted, following a nine-day jury trial.
The Justice Department secretly obtained two months of telephone records of reporters and editors for The Associated Press in what the news cooperative's top executive called a "massive and unprecedented intrusion" into how news organizations gather the news.
A new wave of cyber attacks is striking American corporations, prompting warnings from federal officials, including a vague one issued by the Department of Homeland Security. This time, officials say, the attackers’ aim is not espionage but sabotage, and the source seems to be somewhere in the Middle East.
Even as the U.S. government confronts rival powers over widespread Internet espionage, it has become the biggest buyer in a burgeoning gray market where hackers and security firms sell tools for breaking into computers. The strategy is spurring concern in the technology industry and intelligence community.
Economic and budget realities have turned the spotlight on fraud, waste and abuse across federal, state and local government organizations, and agencies are employing new technologies that can detect collusive relationships and combat some of the more sophisticated fraud schemes.