U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI) teamed with 10 foreign law enforcement agencies to seize hundreds of domain names that were illegally selling counterfeit merchandise online to unsuspecting consumers. The 706 domain names seized were set up to dupe consumers into unknowingly buying counterfeit goods as part of the holiday shopping season.
Passwords remain the primary means for online authentication and must be protected when stored on a server. Encryption is an option, but it has an inherent weakness in this application because the server authenticating the password must have the key to decrypt it. Hashing is a better option, especially with the judicious use of salt.
A Wisconsin man was sentenced on Monday to two years probation after he admitted taking part in a cyber attack sponsored by the hacker group Anonymous against Kansas conglomerate Koch Industries in February 2011, federal prosecutors said.
The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document.
Researchers have discovered a Linux worm capable of infecting a wide range of home routers, set-top boxes, security cameras, and other consumer devices that are increasingly equipped with an Internet connection.
From a cybercrime perspective, the opportunities are boundless: Seemingly everything has a computer in it, cars and pacemakers included. It’s almost certain that the sophistication of exploits and attacks will increase, and that new exploit modes will surface with the ongoing computing and mobility revolution.
Up to five Nissan North America information security employees could also do double duty as reserve sheriff’s deputies, assisting investigators on forensics cases as part of a first-ever arrangement between the automaker and the Williamson County Sheriff’s Department.
Historically, AutoCAD malware is very rare, although not completely unheard of. A new bug is now making the rounds, targeting these graphics and engineering platforms with exploits targeting old vulnerabilities. The goal is industrial espionage, but it could take a multi-layer infection to do it.
Researchers have proven that wireless communications can be made more secure through a novel approach based on information theory. Their strategy for defeating eavesdroppers, which focuses on the so-called physical layer of communications systems, offers advantages over higher-level techniques such as encryption.
Hardware attacks aren’t exclusive to state-sponsored operations. Criminal organizations could be interested to commercialize counterfeiting products or steal sensitive information to resell. Asian countries are the main areas where manufacturers have production plants. But cheap production costs could hide serious threats.
The European Commission called on Tuesday for new protection for Europeans under United States' law against misuse of personal data, in an attempt to keep in check the U.S. surveillance revealed by former NSA contractor Edward Snowden.
BIPS, based in Copenhagen, Denmark and one of Europe's largest bitcoin payment processors, was breached last week. 1,295 bitcoins, worth around $1,000,000, were stolen. It is thought a two-stage attack — DDoS followed by hack — was employed.
Adam Lanza may have hinted at his deadly plans online in the days before last year's Sandy Hook Elementary School massacre. In documents that were part of a report released Monday, authorities say a Texas woman contacted Hartford police the day of the December 14 attack to say her son had interacted with someone while playing a videogame 20 hours earlier who said there would be a school shooting.
British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud.
Major crime in New York City inched up this year, and Mayor Michael Bloomberg fingered the culprit: too many iPhones and iPads were being swiped. A rise in thefts of shiny Apple products accounted for the slight increase in the city’s annual crime index, a statistic that covers a number of felonies, including murder, grand larceny and robbery.