The Latvian government has agreed to extradite a man to the United States where he is charged with creating and distributing a virus that infected more than a million computers around the world. Deniss Calovskis is accused of running a cyber-crime ring that released the so-called Gozi virus, which prosecutors said was one of the most financially destructive computer viruses in history.
Cyber crime and cyber attacks are genuine threats, with reports of data breaches, hacks, or thefts appearing regularly in the news. But as law enforcement, industry, academic, and government experts prepare to gather in New York City on August 5–8 for the fourth International Conference on Cybersecurity (ICCS 13), it’s worth asking whether the threat has been overstated and the government’s approach to it, overreaching.
Recent work by security researchers indicates that one of the problems with having a "smart" home is that some day, it might be smart enough to attack you. The essence of the forthcoming "internet of things" is that everything we own will some day be outfitted with internet-connected sensors and control systems, allowing all our possessions to communicate with each other and be controlled remotely.
Registration is now open for the fourth in a series of workshops to bring together representatives from government, industry and academia to establish a voluntary Cybersecurity Framework that will help reduce risks to critical infrastructure. The workshop will be held Sept. 11-13, 2013, at the Univ. of Texas at Dallas, and will be the final public session before the preliminary framework is formally released later this year.
AccessData Group, Inc. has announced its first software award program, the AccessData Digital Forensic Endowment Program (ADFEP), geared toward U.S., state and local law enforcement agencies. Two deserving agencies will be awarded AccessData Lab which includes AccessData’s premier support services and training for each member of the team through the award’s one-year period.
A Chinese hacking group accused this February of being tied to the Chinese army was caught last December infiltrating a decoy water control system for a U.S. municipality, a researcher has revealed. The group, known as APT1, was caught by a research project that provides the most significant proof yet that people are actively trying to exploit the vulnerabilities in industrial control systems.
Less than 24 hours after researchers disclosed a new attack that can pluck secrets from webpages protected by the widely used HTTPS encryption scheme, the US Department of Homeland Security is advising website operators to investigate whether they're susceptible.
A new community database has been launched by Verizon to help bridge the uncertainty gap in data breach information: what we know and what we need to know. Based on VERIS, it is designed to facilitate the secure sharing of incident information for the good of all.
In a locked room on Des Moines Area Community College’s Ankeny campus, the state of Iowa stores hundreds of computers, cellphones, tablets and other devices used in criminal activity. Examiners with Iowa’s Internet Crimes Against Children Task Force spend hours looking through copied images from the seized devices. They’re looking at the illegal photos and videos to find evidence that could help save victimized children and stop offenders.
Tech-savvy criminals try to evade being tracked by changing their cellphone's built-in ID code and by regularly dumping SIM cards. But engineers in Germany have discovered that the radio signal from every cellphone handset hides within it an unalterable digital fingerprint – potentially giving law enforcers a simple way of tracking the handset itself.
The National Security Agency’s dominant role as the nation’s spy warehouse has spurred frequent tensions and turf fights with other federal intelligence agencies that want to use its surveillance tools for their own investigations, officials say.
It is no secret that Saudi Arabia, still a chief American ally in the Middle East, has a horrible reputation on human rights, speech, and its policies regarding internet use. And now, one Saudi court has sentenced an activist blogger to 7 years and 600 lashes.
FileTrek conducted a volunteer poll among attendees at BlackHat. When given the choice between hero or villain, the results found that exactly 50 percent of the voters believed Edward Snowden, the American who leaked details of several top-secret mass surveillance programs to the press, is a hero while 50 percent believed he is a villain.
Declaring child prostitution a "persistent threat" in America, the FBI said that authorities had rescued 105 young people and arrested 150 alleged pimps in a three-day sweep in 76 cities. The agency said it had been monitoring Backpage.com and other websites as a prominent online marketplace for sex for sale.
Ten Russia-based crime gangs are behind the majority of text-messaging toll fraud campaigns that can net affiliate marketers of the scams up to $12,000 a month, researchers said at DEF CON 21 recently. SMS text messaging is the most prevalent form of cybercrime on mobile phones today, a scam that charges premium SMS messages to the unwitting victim.