The chief executive of Japan's Mt. Gox, once the world's leading bitcoin exchange, was ordered to the United States to answer questions related to its U.S. bankruptcy case, filed after the company lost $400 million of customers' digital currency.
Another week, another explosive revelation coming from Edward Snowden's archive of NSA documents. This time they reveal the widespread compromise of several German satellite communication providers by the hands of Britain's GCHQ intelligence service and the US NSA.
Hackers posted names, email addresses, message histories, and partially protected login credentials for more than 158,000 forum users of Boxee.tv.
Most cyber attacks today are waged by cost-conscious criminals who mostly repurpose malware and other techniques to get the most bang for their buck, a new study finds.
Misunderstandings, misinterpretation and ineffective safeguards in use by the security experts charged with protecting sensitive data have led to both controversy and confusion surrounding advanced evasion techniques (AETs), and the role that they play in advanced persistent threats (APTs).
Law-enforcement agencies are increasingly finding ways to unmask users of a popular Web browser designed to hide identities and allow individuals to exist online anonymously.
Deadbolt Forensics has commented on the role that digital forensics has played during the investigation into the disappearance of Malaysian Airlines flight MH370.
Police in Wisconsin have at least two devices that secretly track cellphone locations in real time to target suspects or missing persons, according to a published report.
As expected, the White House has issued a plan to end the Section 215 bulk data collection program as it exists today, under which the National Security Agency has been conducting mass surveillance of U.S. citizens’ phone records.
Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency's ability to eavesdrop on some Internet communications, according to a team of academic researchers.
According to a new paper authored by two Google security engineers, 21 out of the world’s top 25 news organizations have been successfully hacked by state-sponsored actors.
Now that organizations and the security industry for the most part have accepted the ugly truth that breaches are inevitable and the bad guys are going to find a way to get inside, the new focus is on how you respond to an attack or attack attempt and minimize the damage.
If Malaysian flight 370 is ever recovered, could draft text messages, videos, and other electronically stored information retrieved from passenger’s mobile phones and other digital devices help tell the story of the doomed airliner’s fate?
The United States Department of Justice wants to broaden its ability to hack criminal suspects’ computers, according to a new legal proposal that was first published by The Wall Street Journal.
Hacking attacks on Chinese computers in 2013 rose by more than half compared with the previous year, with attacks coming from the United States making up a significant proportion, China's top Internet security agency says.