Silent Shield Sponsors First Digital Crime Scene Challenge at 26th Annual Crimes Against Children ConferenceSeptember 12, 2014 5:00 pm | by Silent Shield | Comments
Silent Shield has sponsored the first Digital Crime Scene Challenge at the 26th Annual Crimes Against Children Conference (CACC). Internationally recognized, the CACC is the premier conference of its kind providing practical and interactive instruction to those fighting crimes against children and helping children heal.
Every sector of the United States government has likely been hacked at some point, according to the FBI, which has lent to “unprecedented” partnerships with private industry to protect financial interests targeted by “a wide range of cyber adversaries.”
US government requests for access to Dropbox user content and account details rose in line with subscriber numbers over the first half of 2014, but several of the accounts requested didn’t actually exist, according to the firm.
Yahoo says the government threatened to fine the company $250,000 a day if it did not comply with demands to go along with an expansion of U.S. surveillance by surrendering online information, a step the company regarded as unconstitutional. The outlines of Yahoo's secret and ultimately unsuccessful court fight against government surveillance emerged when a federal judge ordered the unsealing of some material about Yahoo's court challenge.
When the FBI tore down the billion-dollar drugs-and-contraband website Silk Road last October, its death made room for a new generation of black-market bazaars — many with better defenses against the Feds. Nearly a year later, more drugs are sold online than when the Silk Road ruled the dark web.
DDoS attacks are a growing problem. In July, Arbor Networks released global DDoS attack data derived from its ATLAS threat monitoring infrastructure that shows a surge in volumetric attacks in the first half of 2014 with over 100 attacks larger than 100GB/sec reported.
A database of what appears to be some five million login and password pairs for Google accounts has been leaked to a Russian cyber security internet forum. It follows similar leaks of account data for popular Russian web services.
In light of one high profile "hack," is it fair to primarily blame Apple's current security setup? Is it really that easy to penetrate these defenses? In the name of security, we did a little testing using family members as guinea pigs. To demonstrate just how much private information on an iPhone can be currently pulled from iCloud and other sources, we enlisted the help of a pair of software tools from Elcomsoft.
Through the Department of Homeland Security’s Transition to Practice (TTP) program, cybersecurity technologies developed at Sandia National Laboratories — and at other federal labs — now stand a better chance of finding their way into the real world.
Home improvement retailer Home Depot Inc (HD.N) has been sued over data breach by a customer, saying the company failed to properly safeguard customer data from hackers, a lawsuit filed in a Chicago federal court showed on Tuesday.
Microsoft has urged US District Judge Loretta Preska, the judge presiding over the case that sees the company refusing to hand some emails stored in its Dublin facility over to the US government, to find them in contempt.
Digital evidence, one of the fastest growing areas of forensic science, will now have its own subcommittee in the National Institute of Standards and Technology (NIST)-administered Organization of Scientific Area Committees (OSAC). NIST is establishing the OSAC to identify and develop national standards and guidelines for forensic science practitioners to strengthen forensic science in the United States.
Cloud giant Salesforce.com has been forced to warn customers that remote access trojan (RAT) malware known as Dyre may be targeting their PCs to steal log-in credentials.
The Defense Advanced Research Projects Agency (DARPA) is looking for new program analysis techniques and tools to enable analysts to identify vulnerabilities in algorithms implemented in software used by the US government, military, and economic entities.
Security flaws, breaches of privacy and additional vulnerabilities in chat, dating and other social media apps used by nearly one billion subscribers will be revealed by the University of New Haven's Cyber Forensics Research and Education Group (UNHcFREG).