A new study from security software vendor Avast calls into question the effectiveness of Android's factory reset option, which many people have relied upon to delete personal data from their old smartphones before reselling or making a charitable donation with the old device.
The Chinese cyber attack group Deep Panda late last month compromised "several" national security think tanks with multiple, simultaneous, and sophisticated attacks designed to collect information about foreign policy decisions, according to researchers at security firm CrowdStrike.
The internet of things (IoT) has been described as creating a coming tsunami of data, as everything from toilets to microwaves get connected. But it's also a security "wave of terror" in some respects as every new connection threatens to be a portal for cyber criminals.
Rhode Island state police, through an Internet task force, are taking a new approach to finding those that traffic in child pornography. The recent arrival of golden Labrador Thoreau makes Rhode Island the second state in the nation to have a police dog trained to sniff out hard drives, thumb drives and other technological gadgets that could contain child pornography.
Symantec Security Response reports on an ongoing, sophisticated, very possibly state-sponsored “cyber espionage campaign dubbed Dragonfly (aka Energetic Bear)” that managed to infiltrate information systems of “energy grid operators, major electricity generation firms, petroleum pipeline operators and energy industry industrial control system (ICS) equipment manufacturers.”
Tiffany Rad is turning the gender stereotypes in the software industry on their head. Rad is a “white hat,” a hacker who specializes in looking for security holes so they can be fixed. The attorney turned her computer hacking hobby into a career in 2008, when she submitted a research proposal to an underground security conference in New York.
Individuals on the recipients list of the leaked US Marshals Service email to Silk Road auction enquirers are being targeted in a phishing attack, and at least one individual has fallen for the scam. Several individuals on the list received phishing emails from the same source. However, not all the individuals on the leaked email recipients list were targeted.
The Supreme Court released a landmark unanimous ruling last Wednesday limiting the ability of police officers to search a suspect's cellphone. But don't expect the Supreme Court's limitations to impact all law enforcement, because, as Aaron Sankin detailed on the Daily Dot, the United States Customs and Border Protection (CBP) still don't need to consult with a judge before browsing through your smartphone.
Matthew Coniglio's Georgia home held a trove of child pornography, more than 50,000 images and videos stored on laptops, external hard drives and thumb drives.
Security researchers have uncovered what they believe is a significant cybercrime operation in Brazil that took aim at $3.75 billion in transactions by Brazilians. Even half of that value was redirected to criminals, the scope of the swindle would eclipse any other previous electronic theft.
The physical location of data still matters, but will become increasingly irrelevant and will be replaced by a combination of legal location, political location and logical location in most organizations by 2020, according to a report from Gartner, Inc.
In considering the question of cell phone searches by police without a warrant, the Supreme Court ruling in Riley v California had to mesh established policy on search warrants together with an understanding of cell phone technology. To help with that challenge, the justices turned to a variety of sources, among them the NIST Guidelines on Mobile Device Forensics.
Cybercrooks have put together a botnet client which bundles in worm-like functionality that gives it the potential to spread quickly. Seculert warns that the latest version of the Cridex (AKA Geodo) information stealing Trojan includes a self-spreading infection method.
In his mind and online persona, Gilberto Valle left little doubt about the depths of his depravation: In communications over the Internet, he imagined subjecting women he knew to sex-related torture and, in some cases, murder and cannibalism. However, the judge concluded that Mr. Valle’s Internet plotting had been “fantasy role play” and was not evidence of an actual crime.
The United States wants to restart a cybersecurity working group that China shut down after the U.S. indicted five Chinese military officers on charges of hacking into American companies' computers to steal trade secrets.