You can use your phone to figure out your heart rate, track how much you walk, and even measure your sex life. But the powerful sensors inside smartphones can do more than keep you updated on your health: They can also turn your body into a password.
The President's Council of Advisors on Science and Technology (PCAST) has released a report on the state of the nation's cybersecurity. The report's first finding: the US government is terrible at cybersecurity.
New revelations published by the Dutch newspaper NRC indicate that the NSA's Tailored Access Operations (TAO) may have infected more than 50,000 computer networks around the world with spyware that it can turn on and off at will remotely.
New court filings against Ross Ulbricht, the young Texan accused of being the mastermind behind the notorious Silk Road website, show new and compelling evidence that he was the man at the helm.
The later-discovered earlier iteration of Stuxnet was a far more aggressive, stealthy and sophisticated attack that could have ultimately caused catastrophic physical damage in Iran's Natanz facility. So says the expert who deciphered how Stuxnet targeted the Siemens PLCs, after recently reverse-engineering the code and further studying the attacks.
This year has seen a few high-profile wins for the good guys in the form of botnet takedowns, especially those by Microsoft and Symantec earlier this year. But at least one security researcher is warning against rejoicing too heartily: the takedowns, he said, do little to make an impact on web safety for end users — and actually point out ongoing industry weakness in being able to mitigate bots.
A worm-like type of malicious software has been found targeting Apache Tomcat, an open-source Web server application, according to Symantec. The malware, which Symantec calls "Java.Tomdep," differs from other server malware in that it's not written in the PHP scripting language.
Three San Diego Somali men convicted of aiding a terrorist organization in their war-torn homeland have been sent to prison, concluding what’s expected to be the first leg in legal battle that will continue in appeals courts.
We’ve all typed in a password to access a computer network. But how secure is that? Passwords can be hacked or hijacked to get at sensitive personal, corporate or even national security data. That reality has engineers looking for methods beyond passwords to verify computer users and protect data.
GitHub users should consider changing their account password to a more complex one and setting up 2-factor authentication in order to protect themselves from automated brute force attacks, warns GitHub security engineer Shawn Davenport. An attack of that kind is currently aimed at GitHub users, and has been for the past few days.
Huge chunks of Internet traffic belonging to financial institutions, government agencies, and network service providers have repeatedly been diverted to distant locations under unexplained circumstances that are stoking suspicions the traffic may be surreptitiously monitored or modified before being passed along to its final destination.
David Ray Camez is the first cybercrime defendant in the country to go to trial on federal racketeering charges, instead of computer or credit card fraud statutes. The key question facing the jurors isn’t whether Camez was a crook — he’s already serving a state prison term for forgery. It’s whether the website he did business on was an organized criminal enterprise comparable, as a legal matter, to the Mafia or a Los Angeles street gang.
The Federal Bureau of Investigation, which after 9/11 shifted focus almost overnight from fighting organized crime to combating terrorism, is scrambling to again remake itself to be positioned to counter a rising threat: cyber attackers.
Miners are becoming increasingly vulnerable to cyber hacking as they slash costs, automate equipment, rely more on the internet and run mines from hundreds of kilometers away, a survey of nearly 40 mining companies has found.
The U.S. government believes that some scary people are using bitcoin. But here’s another scary prospect: If the government goes overboard with a hard-line approach on bitcoin and other emerging digital currencies, it may merely push them overseas, where they will surely flourish outside of its control.