GFI Software released the findings of an independent study into how workers use company provided computers and laptops for personal activities, and the direct impact that personal use can have on the organization.
It’s not a newsflash that laptops’ webcams can be hacked, allowing remote eyes to peer out at unsuspecting users on the other end. But the news that hundreds of feeds from baby monitors, CCTV cameras and webcams from UK homes and businesses have been hacked and uploaded onto a Russian website takes things to a whole new level of creepy.
China and "one or two" other countries are capable of mounting cyber attacks that would shut down the electric grid and other critical systems in parts of the United States, according to Adm. Michael Rogers, director of the National Security Agency and head of U.S. Cyber Command.
On November 10, a 12-year-old girl left her home in the Baltimore suburb of Nottingham at 7:30am, heading to her middle school. She never returned home. Her digital identities played a role in the forensics work used to track down her abductor. But they also played a major role in her abduction.
Dissenters within the National Security Agency, led by a senior agency executive, warned in 2009 that the program to secretly collect American phone records wasn't providing enough intelligence to justify the backlash it would cause if revealed, current and former intelligence officials say.
In the next few months hackers will try to penetrate the cyber defenses of Britain's major banks and steal information about millions of customers. But for once they'll be welcome.
Encrypted communications is very en vogue post-Snowden, but there can be unintended consequences. The growing use of encryption to address privacy concerns is creating perfect conditions for cyber criminals to hide malware inside encrypted transactions, and even reducing the level of sophistication required for malware to avoid detection.
It’s by no means complete yet, but the transition to a mobile IT environment in government is well established. Parallel with that, however, is the expectation that mobile communications will be able to deliver all that society expects in the way of seamless audio, video streaming and fast transfer of multi-megabyte data files.
Mobile security firm Lookout has discovered a more sophisticated variant of the NotCompatible Android botnet which it says targets enterprise networks through compromised mobile devices.
Leading prosecutors in New York and London police plan to embed staff in each others’ offices, officials say, increasing transatlantic collaboration in an effort to combat cyber crime.
Leading Democrats in both houses of Congress sent letters to 16 major banks and other financial firms requesting detailed information about recent data breaches and briefings from corporate data security officials.
Attackers will continue to resort to non-amplification attacks when there are not enough vulnerable systems available to exploit for reflection methods.There will be a rise in mobile DDoS attacks as emerging countries increase smartphone subscriber usage.
The Senate on Tuesday blocked a bill to end bulk collection of Americans' phone records by the National Security Agency. The legislation would have ended the NSA's collection of domestic calling records, instead requiring the agency to obtain a court order each time it wanted to analyze the records in terrorism cases, and query records held by the telephone companies.
MIT has received $15 million in funding from the William and Flora Hewlett Foundation to establish an initiative aimed at laying the foundations for a smart, sustainable cybersecurity policy to deal with the growing cyber threats faced by governments, businesses, and individuals.
The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems to implement the latter's TextSecure protocol into their clients.