“It appears more cybercriminals are entering into the game at a quicker pace than quite honestly we can keep up with [in the US] to defend our networks from these malicious hackers,” says JD Sherry, the vice president of technology and solutions at Trend Micro, a Tokyo-based cyber-security firm. Here’s a look at the global hotspots for these cyber criminals.
Collecting data about people has become $1 trillion industry, but keeping this information safe is proving near impossible. So, a small group of entrepreneurs and developers are building new technologies that don't rely on data as a digital currency.
A bill named after the late internet activist Aaron Swartz that was supposed to update much-criticized US hacking law is almost certain to be left to wither in Congress, according to various sources with knowledge of the matter.
A 26-year-old Brigham Young University student, Gabriel Camacho, has been arrested on charges of hacking into the school's computer system after an investigation by the BYU and Lindon police departments that began in January 2014. Police reported BYU Information Technology employees discovered a breach in Internet security that they were able to trace back to an office in the Wilkinson Student Center.
As part of a talk on the insecurity of wireless devices at the Black Hat security conference later this week, Cesare plans to reveal a technique that could allow anyone to spoof the signal from a wireless key fob and unlock a car with no physical trace, using a codebreaking attack that takes as little as a few minutes to perform.
Tennessee prosecutors want to move the way search warrants are issued out of the 20th century. At issue is a bill that would allow a magistrate or judge to issue a search warrant by telephone or “other reliable electronic means.”
Cybersecurity researchers at the Georgia Tech Research Institute are developing a tool that amasses information from the Internet to give organizations an early warning of a pending cyber-attack. The system, known as BlackForest, scrapes and analyzes information culled from a variety of online sources to detect potential attacks.
Security experts call it a “drive-by download”: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge.
Better Business Bureau (BBB) serving Nebraska, South Dakota, The Kansas Plains and Southwest Iowa is warning about a relatively new kind of voice mail fraud that allows hackers to use a voice mail system and the default password to accept calls without the knowledge or permission of the business or the consumer.
A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password combinations and more than 500 million email addresses, security researchers say.
The Army’s Cyber Center of Excellence is getting a new commanding general, the chief of staff announced. Maj. Gen. Stephen Fogarty will be assigned as commanding general at the center and of Fort Gordon. He will replace Maj. Gen. LaWarren Patterson, who was reassigned as deputy commanding general for operations and chief of staff, Installation Management Command, at Joint Base San Antonio, Texas.
A string of documents detailing the operations and effectiveness of the FinFisher suite of surveillance platforms appears to have been leaked. The documents, some dated 4 April this year, detail the anti-virus detection rates of the FinFisher spyware which German based Gamma Group sold to governments and law enforcement agencies.
Cybersecurity researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight entertainment systems - a claim that, if confirmed, could prompt a review of aircraft security.
The National Science Foundation's (NSF) Secure and Trustworthy Cyberspace (SaTC) program has announced two new center-scale "Frontier" awards to support large, multi-institution projects that address grand challenges in cybersecurity science and engineering with the potential for broad economic and scientific impact.
Federal law requires people and companies to report child exploitation when they see it. This includes Google, whose automated eyes tipped law enforcement about a Houston-area man whom the police say was using the company’s Gmail service to email pornographic images of a child.