Shady stock trades are nothing new to Henry Pontell, UC Irvine professor of criminology, law & society and sociology. What’s changed isn’t the scam but the artist: In this digital age, the criminal mastermind is often a mere child.
The dark web just got a little less dark with the launch of a new search engine that lets you...
A 19-year-old Canadian student has been arrested for breaching the systems of the Canada Revenue...
Sweetie looks much like other unfortunate young Filipinas. But unlike her peers, Sweetie is a computer-generated avatar created by a Dutch non-profit group seeking to unmask sexual predators on the Internet.
Four black brick towers search upwards to an empty grey sky. Mounted security cameras watch on balefully. If it weren’t for all the cheery cyclists passing by, some with surfboards in hand, alleviating the unfaltering graveness of the place, Europol’s headquarters would strike any visitor as some post-apocalyptic Mordor.
The Certified Cyber Forensics Professional is the only global standard currently available for assessing experienced digital forensics professionals’ mastery of the discipline. Originally only available for the U.S. and South Korea, the credential has been developed for the European legal environment.
Coverage of the National Security Agency's sweeping surveillance program that won the Pulitzer Prize for public service Monday follows a tradition of bucking the U.S. government on matters of secret intelligence.
The catastrophic Heartbleed security bug that has already bitten Yahoo Mail, the Canada Revenue Agency, and other public websites also poses a formidable threat to end-user applications and devices, including millions of Android handsets, security researchers warn.
Investigator's have found no evidence of backdoors or otherwise intentionally malicious code in the assessed areas of TrueCrypt's Windows kernel code, bootloader, filesystem driver or areas around this code.
More than a year after security firm Mandiant caused a stir by publishing a report that alleged China was behind widespread and increasingly sophisticated cyberespionage projects, it’s back again to tell us that things have gone from bad to worse.
The Air Force Academy took second place at the conclusion of the 14th annual National Security Administration inter-service Cyber Defense Exercise on April 8-11.
Tilbury will provide technical leadership for the services team, driving innovation to support customers in a variety of offerings, including incident response, remediation, forensic support, penetration testing, intelligence operations, and counter-threat assessments.
A US federal appeals court has vacated the conviction and sentence received by Andrew "weev" Auernheimer for the AT&T iPad hack.
Nine alleged members of a wide-ranging racketeering enterprise and conspiracy who infected thousands of business computers with malicious software known as “Zeus” have been charged in an indictment.
The Justice Department and the Federal Trade Commission are trying to allay private-sector fears that sharing cyberthreat information could be seen as a violation of antitrust laws.
Stepping into a heated debate within the nation’s intelligence agencies, President Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should — in most circumstances — reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyber attacks.
Hackers stole the personal information of about 200,000 South Korean credit card users, using some to make fake cards and rack up fraudulent charges of about 120 million won ($115,400), an official of the country's financial regulator say.
The Heartbleed bug is also unusually worrisome because it could possibly be used by hackers to steal your usernames and passwords — for sensitive services like banking, ecommerce, and web-based email — and by spy agencies to steal the private keys that vulnerable web sites use to encrypt your traffic to them.