U.S. utilities would benefit from an independent group to set industry-wide guidelines on combating cyber threats, according to a think-tank report that was co-authored by a former director of the Central Intelligence Agency.
Police may soon have a new way to catch pedophiles who distribute child abuse photos anonymously online. The technology could also identify smartphone thieves who take pictures with the stolen gadgets and then post their snapshots on the Internet.
Police in Florida have offered a startling excuse for having used a controversial “stingray” cell phone tracking gadget 200 times without ever telling a judge: the device’s manufacturer made them sign a non-disclosure agreement that they say prevented them from telling the courts.
Bloomberg has reported that US retail giant Sears "is investigating a possible security breach after a series of cyber attacks on other retailers have exposed the data of millions of consumers."
The Texas Court of Criminal Appeals has ruled that law enforcement officials do need a warrant to search an arrested person's cell phone after they've been jailed. The ruling did not decide whether it is legal or not for police to search a suspect's phone at theincidence of arrest, which is currently a hotly contested subject. The Supreme Court is set to decide that matter later this year.
Mt. Gox filed for bankruptcy on Friday but bitcoin insiders say its downfall began nearly a year ago as the virtual currency exchange tangled with regulators, split from former business partners and grappled with cyber attacks.
Cellebrite, a leading provider of mobile forensic and mobile data transfer solutions, shares its industry forecast of top trends shaping mobile forensics this year. Cellebrite surveyed its customer base and conducted interviews with leading mobile forensic experts and analysts spanning the industry.
James Comey, the recently confirmed FBI director, said that addressing cybersecurity issues effectively can only be done through increased cooperation with law enforcement and the collective efforts and wisdom of the commercial information security community
For just $35, you can buy a popular, specialized malware tool that steals Bitcoins and other such electronic currency — and researchers have unearthed more than 100 different malware families that specialize in this form of theft.
Manhattan U.S. Attorney Preet Bharara has sent subpoenas to Mt. Gox, other bitcoin exchanges, and businesses that deal in bitcoin to seek information on how they handled recent cyber attacks, a source familiar with the probe said on Wednesday.
FBI agents arrested a Mexican tycoon named Jose Susumo Azano Matsura at his Coronado, Calif. home on Wednesday as part of a political bribery investigation based on captured emails, seized banking records, and covertly recorded conversations. The Azano case illustrates how officials around the world must not only exercise skepticism toward new surveillance technologies, but also toward the shady contractors hawking spy products.
A cybersecurity firm says that it uncovered stolen credentials from some 360 million accounts that are available for sale on cyber black markets, though it is unsure where they came from or what they can be used to access.
The US is not unique among nations when it comes to its intelligence gathering abilities. “We are just better” at it than most countries, according to Richard Clarke, the former presidential counter-terrorism adviser.
The considerations that led President Obama to hesitate about using the offensive cyber weapons his administration has spent billions helping develop, in large part with hopes that they can reduce the need for more-traditional military attacks, reflect larger concerns about a new and untested tactic with the potential to transform the nature of warfare.
Attorney General Eric Holder is calling on Congress to require companies to more quickly alert customers when their personal information is put at risk in cyber breaches.