A Wisconsin man was sentenced on Monday to two years probation after he admitted taking part in a cyber attack sponsored by the hacker group Anonymous against Kansas conglomerate Koch Industries in February 2011, federal prosecutors said.
The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document.
Researchers have discovered a Linux worm capable of infecting a wide range of home routers, set-top boxes, security cameras, and other consumer devices that are increasingly equipped with an Internet connection.
From a cybercrime perspective, the opportunities are boundless: Seemingly everything has a computer in it, cars and pacemakers included. It’s almost certain that the sophistication of exploits and attacks will increase, and that new exploit modes will surface with the ongoing computing and mobility revolution.
Up to five Nissan North America information security employees could also do double duty as reserve sheriff’s deputies, assisting investigators on forensics cases as part of a first-ever arrangement between the automaker and the Williamson County Sheriff’s Department.
Historically, AutoCAD malware is very rare, although not completely unheard of. A new bug is now making the rounds, targeting these graphics and engineering platforms with exploits targeting old vulnerabilities. The goal is industrial espionage, but it could take a multi-layer infection to do it.
Researchers have proven that wireless communications can be made more secure through a novel approach based on information theory. Their strategy for defeating eavesdroppers, which focuses on the so-called physical layer of communications systems, offers advantages over higher-level techniques such as encryption.
Hardware attacks aren’t exclusive to state-sponsored operations. Criminal organizations could be interested to commercialize counterfeiting products or steal sensitive information to resell. Asian countries are the main areas where manufacturers have production plants. But cheap production costs could hide serious threats.
The European Commission called on Tuesday for new protection for Europeans under United States' law against misuse of personal data, in an attempt to keep in check the U.S. surveillance revealed by former NSA contractor Edward Snowden.
BIPS, based in Copenhagen, Denmark and one of Europe's largest bitcoin payment processors, was breached last week. 1,295 bitcoins, worth around $1,000,000, were stolen. It is thought a two-stage attack — DDoS followed by hack — was employed.
Adam Lanza may have hinted at his deadly plans online in the days before last year's Sandy Hook Elementary School massacre. In documents that were part of a report released Monday, authorities say a Texas woman contacted Hartford police the day of the December 14 attack to say her son had interacted with someone while playing a videogame 20 hours earlier who said there would be a school shooting.
British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud.
Major crime in New York City inched up this year, and Mayor Michael Bloomberg fingered the culprit: too many iPhones and iPads were being swiped. A rise in thefts of shiny Apple products accounted for the slight increase in the city’s annual crime index, a statistic that covers a number of felonies, including murder, grand larceny and robbery.
The capillary diffusion of technology in our society has an important consequence. Hardware has to be properly analyzed during acquisition and qualification phases of the supply chain. We’re surrounded by electronic devices and appliances that in many cases perform critical functions in areas such as telecommunications, defense and health. Because of that, it’s crucial to validate electronic components they contain.
The Capture the Flag (CTF) teams gathered at the Polytechnic Institute of New York Univ. (NYU-Poly) Jacobs Gymnasium didn’t have time to talk or even give their names, so intently were they working to solve the applications security challenge set forth for them as part of NYU-Poly’s Cyber Security Awareness Week (CSAW). Intense focus paid off for PPP1, which took second place in the contest.