In President Obama’s speech recently outlining surveillance reforms, the president promised he would allow corporations like Google, Apple and Microsoft to be more transparent with their customers about NSA spying. Now, we have learned what that means.
Security experts have long warned that users should be more concerned about the sometimes excessive personal data that some apps take from their hosts. Now it seems that criminals and advertisers are not the only people interested in this information: NSA and GCHQ have been developing the ability to take advantage of leaky mobile apps.
The vice chairman of the Bitcoin Foundation, a trade group promoting the adoption of the digital currency, has been charged by U.S. prosecutors with conspiring to commit money laundering by helping to funnel cash to illicit online drugs bazaar Silk Road.
While investigating a hosting company known for sheltering child porn last year the FBI incidentally seized the entire email database of a popular anonymous webmail service called TorMail. Now the FBI is tapping that vast trove of email in unrelated investigations.
The FBI has announced that it had arrested two operators of a US-based email hacking website, and three customers of foreign email hacking sites. Operators of foreign email hacking sites were arrested by national authorities in Romania, India and China in what is believed to be the first joint operation involving these four countries.
Hackers broke into an Israeli defense ministry computer via an email attachment tainted with malicious software that looked like it had been sent by the country's Shin Bet secret security service, an Israeli cyber security firm says.
The FBI has warned U.S. retailers to prepare for more cyber attacks after discovering about 20 hacking cases in the past year that involved the same kind of malicious software used against Target Corp in the holiday shopping season.
Penetration testing (pen testing), also known as "ethical hacking," is an important and key step in reducing the risks of a security breach because it helps provide IT staff with an accurate view of the information system from an attackers point of view.
The hacktivist group known as the Syrian Electronic Army was a particularly active adversary in the second half of 2013, and remains one of the top global threat actors to watch in the coming year as the Syrian conflict drags on — not least because of the group’s ability to morph its techniques to keep things interesting.
A notorious "revenge porn" website operator and another California man have been charged with stealing nude photos from hundreds of hacked email accounts and posting the images online.
A sharply divided government task force that reviewed the National Security Agency's surveillance program for four months has urged President Barack Obama to shut down the agency's bulk collection of phone data and purge its massive inventory of millions of Americans' calling records.
Nearly 30 security vulnerabilities so far have been found in products using a popular ICS/SCADA communications protocol, prompting about half of the affected vendors to patch their products, and at least one vendor to pull its affected software from the market and urge its customers to instead install another one of its products.
Several security flaws in the popular Google Chrome browser can be exploited to turn the computer into a surreptitious listening device, claims Israeli developer Tal Ater.
Computer scientists have identified almost two dozen computers that were actively working to sabotage the Tor privacy network by carrying out attacks that can degrade encrypted connections between end users and the websites or servers they visit.
Backbone Security has released the latest version of their Steganography Application Fingerprint Database (SAFDB), which now contains over 1,200 steganography applications. Developed in Backbone’s Steganography Analysis and Research Center (SARC), SAFDB is the world’s largest commercially available hash set exclusive to digital steganography applications.