Alicia’s Law, the popular anti-child pornography initiative believed to be dead in 2014, comes roaring back to life when the Virginia General Assembly votes on a surprise proposal by Governor Terry McAuliffe to save the legislation.
A bill that would criminalize the posting of intimate images over the Internet as an act of humiliation — so-called "revenge porn" — passed its first test in the Colorado state legislature, sailing unanimously through a key committee.
A Dutch man who allegedly used the shuttered Silk Road underground website to sell illegal drugs for bitcoins worth millions of dollars has agreed to plead guilty to a federal drug conspiracy charge filed against him.
American law enforcement has long advocated for universal “kill switches” in cellphones to cut down on mobile device thefts. Now the Department of Justice argues that the same remote locking and data-wiping technology represents a threat to police investigations — one that means they should be free to search phones without a warrant.
An informant working for the F.B.I. coordinated a 2012 campaign of hundreds of cyber attacks on foreign websites, including some operated by the governments of Iran, Syria, Brazil and Pakistan, according to documents and interviews with people involved in the attacks.
The first open source web application for managing the mobile app vetting process is available for free from the National Institute of Standards and Technology (NIST).
A new report by McAfee sheds light on the underground world of online gambling. It identifies the proliferation of online casinos, an industry set to grow nearly 30 percent over the next three years, and how their use is fuelling cyber crime by making it easy to “cash in” on illegal activities.
The important role OpenSSL plays in securing the Internet has never been matched by the financial resources devoted to maintaining it.
Verizon released its Verizon Data Breach Investigations report (DBIR) recently, showing both an uptick in security incidents and a rising inability of enterprises to keep up with the rapidly evolving innovation on the part of cyber attackers.
In this internet age, as more devices are hooked up online, so they become more vulnerable to attack. As industries like maritime and energy connect ships, containers and rigs to computer networks, they expose weaknesses that hackers can exploit.
Following a public comment period and review, NIST has removed a cryptographic algorithm from its draft guidance on random number generators. Before implementing the change, NIST is requesting final public comment.
Apple has patched versions of its iOS and OS X operating systems to fix yet another extremely critical cryptography vulnerability that leaves some users open to surreptitious eavesdropping.
Criminals use a range of tactics from simple email scams to social-media threats to sophisticated malware, but only 11 percent of U.S. businesses have adopted industry-standard cybersecurity measures.
For all the talk about how something should be done to fix OpenSSL so that a Heartbleed situation is never again repeated, there has been little to no concrete action so far.
Sometimes, when a computer forensics expert is dissecting a suspect’s computer, the most important question to answer is this: “Am I looking at the original hard-drive, with all of its incriminating evidence, or has that drive been swapped out surreptitiously for a new drive, which will not contain the evidence that I’m hoping to find?”