It's called "revenge porn," and it's legal in every state but California and New Jersey. A person shares a sexually explicit photo or video with a partner, only to see those images pop up online months or even years later — typically after a bad breakup. The images are often tied to the person's name, address and phone number.
The US government is on a data-gathering spree at Google, new data from the search giant reveals. Between January and June 2013, the US government issued nearly 11,000 requests to Google asking for user information, or about 42 percent of the global total. India was second with nearly 2,700 government requests.
U.S. authorities are investigating a series of cybersecurity incidents targeting the HealthCare.gov website at the center of President Obama's healthcare law, a U.S. homeland security official told Congress.
Former U.S. National Security Agency contractor Edward Snowden leaked as many as 200,000 classified U.S. documents to the media, according to little-noticed public remarks by the eavesdropping agency's chief late last month.
You definitely don't want to show up on one of HD Moore's Internet scans. But some 35,000 — and counting — servers have been found exposed on the Internet by the renowned researcher and his team in their ongoing global scanning project aimed at detecting networked devices in danger of attack.
The Adobe hack is truly gargantuan, what with all the stolen source code of a number of extremely popular software and the exfiltrated database containing user email addresses, poorly encrypted passwords and associated hints in plaintext.
Microsoft Corp. has opened the Microsoft Cybercrime Center, a center of excellence for advancing the global fight against cybercrime. The Cybercrime Center combines Microsoft’s legal and technical expertise as well as cutting-edge tools and technology with cross-industry expertise to effectively fight crime on the Internet.
Venafi has released the results of in-depth research by its Threat Center team into how Edward Snowden successfully breached the National Security Agency (NSA). After months of review, analysis and peer feedback, this research reveals that the contract worker leveraged valid credentials as a low-level system administrator to fabricate cryptographic keys and digital certificates.
Since full public availability of GPS signals began in 2000, the Defense Department’s Global Positioning System has become a staple feature in consumer devices from stand-alone personal navigation systems to smartphones, helping us to find our way (and allowing advertisers to find their way to us). Despite its commercial success, GPS never was conceived as a consumer service.
Documents provided by former National Security Agency contractor Edward Snowden have revealed that the NSA and its partner, Great Britain's GCHQ, have done a whole lot more than just passively monitor what passes over the Internet. Using their surveillance tools, the intelligence agencies have been able to identify and target individuals at organizations of interest — not just suspected terrorist cells.
Some Purdue University researchers are working on technology that could see all those passwords that computer users must punch in replaced with steps such as iris and fingerprint scans.
A 19-year-old computer science student pleaded guilty to hacking the computers of Miss Teen USA and other women and secretly photographing them with their own webcams. Jared James Abrahams answered a series of questions from U.S. District Judge James Selna, including an explanation of the crimes that were committed.
FireEye, Inc. has released a new report that details how many seemingly unrelated cyber attacks may, in fact, be part of a broader offensive fueled by a shared development and logistics infrastructure — a finding that suggests some targets are facing a more organized menace than they realize.
Back in July 2013, The Washington Post reported that nearly a decade ago, the NSA developed a new technique that allowed spooks to “find cellphones even when they were turned off.” Many security researchers scratched their heads trying to figure out how this could be so.
Big business wants your voice — not for customer feedback, but to tackle fraud. Voice biometrics — the recording and analysis of unique voiceprints for authentication purposes - is one of the latest technological weapons being deployed in the war against fraudsters,