FBI agents arrested a Mexican tycoon named Jose Susumo Azano Matsura at his Coronado, Calif. home on Wednesday as part of a political bribery investigation based on captured emails, seized banking records, and covertly recorded conversations. The Azano case illustrates how officials around the world must not only exercise skepticism toward new surveillance technologies, but also toward the shady contractors hawking spy products.
A cybersecurity firm says that it uncovered stolen credentials from some 360 million accounts that are available for sale on cyber black markets, though it is unsure where they came from or what they can be used to access.
The US is not unique among nations when it comes to its intelligence gathering abilities. “We are just better” at it than most countries, according to Richard Clarke, the former presidential counter-terrorism adviser.
The considerations that led President Obama to hesitate about using the offensive cyber weapons his administration has spent billions helping develop, in large part with hopes that they can reduce the need for more-traditional military attacks, reflect larger concerns about a new and untested tactic with the potential to transform the nature of warfare.
Attorney General Eric Holder is calling on Congress to require companies to more quickly alert customers when their personal information is put at risk in cyber breaches.
Researchers have developed attack code that completely bypasses Microsoft's zero-day prevention software, an impressive feat that suggests criminal hackers are able to do the same thing when exploiting vulnerabilities that allow them to surreptitiously install malware.
Cyber criminals have infected hundreds of thousands of computers with a virus called "Pony" to steal bitcoins and other digital currencies, in the most ambitious cyber attack on virtual money uncovered so far, according to security firm Trustwave.
nPulse Technologies announced the launch of its Cyclone Network Forensics Platform, designed to dramatically slash incident response times. Cyclone builds adds advanced, line-rate extraction of crucial application layer security metadata and a flexible big data security analytics framework to index, search, analyze and visualize network traffic and expeditiously reconstruct cyber attack kill chains.
Men who have seen and suffered the horrors of combat steel themselves each day for a job some find just as wrenching: fighting child sex crimes back home.
The Neiman Marcus breach is not as bad as previously believed, as the number of potentially affected cards dropped from 1.1 million to approximately 350,000.
Like everything else on the iPhone, the critical crypto flaw announced in iOS 7 turns out to be a study in simplicity and elegant design: a single spurious “goto” in one part of Apple’s authentication code that accidentally bypasses the rest of it.
The National Security Agency wants to raise cybersecurity into a more scientific endeavor from its current role as an art form of hits, misses and post-attack patches. To support those aims, the agency is now accepting nominations for the best scientific cybersecurity paper published between October 1 and December 31, 2013.
Popular domain registrar and web hosting service Namecheap has been having trouble with an unexpected DDoS attack targeting 300 or so domains on two of their DNS nameservers.
International cyber policy and enforcement and ownership over the Internet are all thorny topics, particularly since the Edward Snowden leaks. All of these subjects will be tackled at the RSA Conference in a panel discussion titled "Cyber Battle: The Future of Conflict."
AccessData, a leader in incident resolution solutions, has announced the InSight™ Platform, a cybersecurity system that enables enterprises to adeptly manage the rapidly accelerating volume of data incidents caused by cyber attacks, mobile risk, GRC (Governance Risk & Compliance) and eDiscovery requests.