CCL will be demonstrating the social media monitoring tool Signal at the UK’s first international social media law enforcement conference.
The new digital forensics program at the University at Albany is designed to educate and prepare students to work in a fast-growing, billion-dollar market with high, long-term projected demand for trained professionals.
Community Health Systems, one of the biggest U.S. hospital groups, said on Monday it was the victim of a cyber attack from China, resulting in the theft of Social Security numbers and other personal data belonging to 4.5 million patients.
Nuclear Regulatory Commission computers within the past three years were successfully hacked by foreigners twice and also by an unidentifiable individual, according to an internal investigation.
Discussions of what government should do about the state of poor cyber defenses tend to focus on some kind of change in the law to raise regulations and/or lower liabilities. That is well and good, but government should also think about building a new organization for the cyber age. And it can do so by taking inspiration from one of the most successful agencies created in the past.
There are striking similarities between a crime scene investigation and cybercrime forensics. With IBM reporting 1.5 million U.S. cyber attacks monitored in 2013, IT and security professionals can take a few tips from law enforcement about securing, assessing and reporting at a cyberattack crime scene.
Cybersecurity experts raise doubts whether the National Security Agency has successfully deployed an automated hack-back system known as MonsterMind, as revealed by former NSA contractor Edward Snowden in an interview with Wired.
Security researchers have uncovered evidence of escalating cyber attacks emanating from Syria which use tried and tested techniques to download remote access trojans (RATs) onto victim PCs.
Germany's foreign intelligence agency recorded at least one phone conversation held by U.S. Secretary of State John Kerry, a German magazine said on Saturday, potentially embarrassing Berlin which has reprimanded Washington for its surveillance.
A group of journalists has reported the existence of the "Hacienda" spy program. According to this report, five western intelligence agencies are using the Hacienda software to identify vulnerable servers across the world in order to control them and use them for their own purposes. Scientists have developed free software that can help prevent this kind of identification and thus the subsequent capture of systems.
The FBI's premier cybersquad has focused attention on computer-based crime in recent months by helping prosecutors charge five Chinese army intelligence officials with stealing trade secrets from major companies and by snaring a Russian-led hacking ring that pilfered $100 million from bank accounts worldwide.
The North Atlantic Treaty Organization is expected to update its charter in September to address cybersecurity while leaving open the question of whether hacks count as an attack on its member states that could start a war. Leaving the definition open could cool fears about whether hackers could start a war.
Turning computer code into a kind of math puzzle may hold the key to protecting software from hackers. A consortium of universities developing the idea, called mathematical obfuscation, recently received a $5 million grant from the U.S. government as part of a broader cybersecurity initiative.
Secure Channels Inc. has announced that none of the 155 hackers at the recent Black Hat USA 2014 Conference in Las Vegas who participated in a “Can You Break This” contest were able to hack the company’s new patented PKMS2 Encryption Technology.
Mixing upper and lower case letters, numbers and special characters doesn’t make passwords any harder for hackers to crack, only increasing the number of characters does, according to new research from Trustwave.