Researchers have uncovered a malware campaign that gave attackers the ability to sabotage the operations of energy grid owners, electricity generation firms, petroleum pipelines, and industrial equipment providers.
After detecting more than 7.4 million infections among its customers by the Jenxcus and Bladabindi worms, Microsoft kicked off legal action to disrupt these pervasive malware threats.
Cloud computing helps to make data more accessible, but the same technologies that make it readily available — on-demand provisioning, reprovisioning and virtual environments — also can obscure it. This is creating new challenges for digital forensics, complicating incident response and criminal and civil investigations into incidents and data in the cloud.
The newly installed director of the National Security Agency says that while he has seen some terrorist groups alter their communications to avoid surveillance techniques revealed by Edward J. Snowden, the damage done over all by a year of revelations does not lead him to the conclusion that “the sky is falling.”
A monthlong national effort to capture sex predators led to 275 arrests in Southern California that included a teaching assistant for special needs kids, a retired sheriff's deputy and a U.S. Army soldier. The effort dubbed "Operation Broken Heart" involved dozens of local, state and federal authorities throughout the month of May who targeted sex offenders, child sex traffickers, pimps, child porn traders and sex tourists traveling abroad.
Former News of the World editor Rebekah Brooks said Thursday she is innocent ofphone hacking and other crimes and feels vindicated by a jury's unanimous decision to acquit her. The ex-tabloid editor made her first public statement since being cleared after an eight-month trial on charges of conspiring to hack phones, bribe officials and obstruct police.
A 20 year old bug has been discovered in an algorithm so pervasive it's used in the Mars Curiosity rover, cars, aircraft, Android phones and a string of popular open source wares. The bug can be found in the Lempel-Ziv-Oberhumer (LZO) data compression algorithm created by Markus Oberhumer, who on Wednesday posted a new version 2.07 of the code and revealed the bug.
The bitcoin world kicked into high gear Friday as the US government began auctioning some of the virtual currency seized in an FBI investigation of dark Web bazaar Silk Road. The US Marshals Service auction was taking place until 2200 GMT for 29,000 bitcoins — about $17 million at current rates, although bitcoin values have been highly volatile.
A South St. Paul burglar effectively updated his status to "busted" when he logged into Facebook on a computer in the home he is accused of breaking into, prosecutors say.
The German government has cancelled a contract with U.S. telecoms firm Verizon Communications Inc as part of an overhaul of its internal communications, prompted by revelations last year of U.S. government spying.
Aging, unsupported equipment leaves devices wide open to hackers and criminals. Old, outdated equipment also tends to have old, outdated software — and that means that new, updated malware can have a field day with it.
Android and iOS mobile trojans likely used for surveillance through mobile devices of journalists and politicians, activists and human rights advocates have been discovered circulating in the wild.
As a result of the advance of the so-called Internet of Things, where all devices are connected and communicate with one another, embedded systems — small computer systems built around microcontrollers — are becoming more common. But they remain vulnerable to security breaches.
Utica College has been designated as a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency (NSA) and the Department of Homeland Security. In addition, it's only the seventh institution of higher learning in the country to earn a National Center for Digital Forensics Academic Excellence (CDFAE) from the Defense Cyber Crime Center (DC3).
In an emphatic defense of privacy in the digital age, a unanimous Supreme Court ruled Wednesday that police generally may not search the cellphones of people they arrest without first getting search warrants.