Chinese state media has branded Apple Inc's iPhone a threat to national security because of the smartphone's ability to track and time-stamp user locations.
Illegally obtaining TV and movies is almost endemic in the Asia-Pacific region though.
Justin Ross Harris is charged with felony murder and second-degree child cruelty in the death of his son, Cooper. He claims that he forgot to drop his son off at daycare before heading to work. Cooper Harris spent nearly seven hours in the SUV as temperatures rose to 88 degrees. Computer forensics will be key in the case as police uncovered Harris' sexting and penchant for videos about death from his computers.
To defeat malware, government agencies need to determine how threats entered a network and where they went once inside. But this relatively simple task is complicated by attackers’ ability to cover their tracks and to do so over an extended period of time.
Chinese hackers in March broke into the computer networks of the United States government agency that houses the personal information of all federal employees, according to senior American officials. They appeared to be targeting the files on tens of thousands of employees who have applied for top-secret security clearances.
Digital forensic investigation software was used by Croatian Police to prosecute an international case involving exploitation of children for pornography. During this case, Croatian Police used Belkasoft Evidence Center to extract and analyze information from suspects' computers, memory dumps and hard drive images.
Russia accused the United States on Tuesday of violating a bilateral treaty and "kidnapping" a Russian accused of hacking into U.S. retailers' computer systems to steal credit card data.
Facebook has revealed details of how it helped derail a little-known botnet operation out of Greece that was used to steal and mine digital currency and spread via Facebook and Lightcoin mining — infecting some 250,000 machines worldwide.
A new study from security software vendor Avast calls into question the effectiveness of Android's factory reset option, which many people have relied upon to delete personal data from their old smartphones before reselling or making a charitable donation with the old device.
The Chinese cyber attack group Deep Panda late last month compromised "several" national security think tanks with multiple, simultaneous, and sophisticated attacks designed to collect information about foreign policy decisions, according to researchers at security firm CrowdStrike.
The internet of things (IoT) has been described as creating a coming tsunami of data, as everything from toilets to microwaves get connected. But it's also a security "wave of terror" in some respects as every new connection threatens to be a portal for cyber criminals.
Rhode Island state police, through an Internet task force, are taking a new approach to finding those that traffic in child pornography. The recent arrival of golden Labrador Thoreau makes Rhode Island the second state in the nation to have a police dog trained to sniff out hard drives, thumb drives and other technological gadgets that could contain child pornography.
Symantec Security Response reports on an ongoing, sophisticated, very possibly state-sponsored “cyber espionage campaign dubbed Dragonfly (aka Energetic Bear)” that managed to infiltrate information systems of “energy grid operators, major electricity generation firms, petroleum pipeline operators and energy industry industrial control system (ICS) equipment manufacturers.”
Tiffany Rad is turning the gender stereotypes in the software industry on their head. Rad is a “white hat,” a hacker who specializes in looking for security holes so they can be fixed. The attorney turned her computer hacking hobby into a career in 2008, when she submitted a research proposal to an underground security conference in New York.
Individuals on the recipients list of the leaked US Marshals Service email to Silk Road auction enquirers are being targeted in a phishing attack, and at least one individual has fallen for the scam. Several individuals on the list received phishing emails from the same source. However, not all the individuals on the leaked email recipients list were targeted.