A new wave of cyber attacks is striking American corporations, prompting warnings from federal officials, including a vague one issued by the Department of Homeland Security. This time, officials say, the attackers’ aim is not espionage but sabotage, and the source seems to be somewhere in the Middle East.
Even as the U.S. government confronts rival powers over widespread Internet espionage, it has become the biggest buyer in a burgeoning gray market where hackers and security firms sell tools for breaking into computers. The strategy is spurring concern in the technology industry and intelligence community.
Economic and budget realities have turned the spotlight on fraud, waste and abuse across federal, state and local government organizations, and agencies are employing new technologies that can detect collusive relationships and combat some of the more sophisticated fraud schemes.
A brazen gang of cyber criminals, who stole $45 million from bank ATMs in 27 countries, exposes an Achilles heel in the global financial industry: prepaid debit cards. Cyber security experts and industry analysts say the burgeoning use of prepaid debit cards for everything from gift certificates to disaster relief handouts is making it easier for hackers to withdraw large amounts of money before detection.
German prosecutors have said they had arrested two Dutch people suspected of involvement in a global cyber theft of $45 million from two Middle Eastern banks. The Duesseldorf prosecutor's office said a 35-year-old male and a 56-year-old woman had been caught on February 19 withdrawing 170,000 euros in Duesseldorf using Bank of Muscat credit cards.
We all know surveillance is big in Putin’s Russia. What you may not know is that Russia’s surveillance tech is being used all over — even here in the U.S. The Kremlin is up to its domes in spy technology. One reason is fear, provoked by the Arab Spring, of a growing and diffuse protest movement that uses social media to organize.
A four-count federal indictment was unsealed in Brooklyn charging eight defendants with participating in two worldwide cyberattacks that inflicted $45 million in losses on the global financial system in a matter of hours. These defendants allegedly formed the New York-based cell of an international cybercrime organization that used sophisticated intrusion techniques to hack into the systems of global financial institutions.
An electrocardiogram maps each heartbeat according to five peaks and troughs known as a PQRST pattern. This pattern is affected by such things as the heart’s size, its shape and its position in the body. Cardiologists have known since 1964 that everyone’s heartbeat is unique, and researchers around the world have been trying to turn that knowledge into a viable biometric system. Until now, they have had little success.
Can the FBI obtain Americans’ emails without a warrant? That depends on which branch of the government you ask — because federal policy on electronic communications is in a “state of chaos,” according to the ACLU. The civil liberties group has published a series of documents, obtained under the Freedom of Information Act, that demonstrate how confused and contradictory guidance on email snooping is.
Ren Zhengfei, founder and CEO of Huawei Technologies Co Ltd, defended the Chinese firm's stand on U.S. cybersecurity concerns when he spoke to the media for the first time, lifting a veil of secrecy surrounding the elusive executive. Ren has avoided the press since he founded Huawei 26 years ago, which has fueled criticism by some foreign officials that the company is not transparent about its activities.
Digital forensics can help curb cybercrime by giving companies the additional knowledge, and should be taught in schools early to cultivate the students' passion. This will go some way to address the talent crunch in the industry, according to Vrizlynn Thing, the acting head of the cybercrime, security and intelligence (CSI) department at the Institute for Infocomm Research (I2R).
An Arizona judge has denied a motion to suppress evidence collected through a spoofed cell tower that the FBI used to track the location of an accused identity thief. The ruling means that the government may use not only evidence gathered through its fake cell tower to locate an air card that Daniel David Rigmaiden was using to access the internet, but also evidence gathered from the apartment to which they tracked him.
On Monday, the "hacktivist" group Syrian Electronic Army briefly took over the Twitter account of the satirical news publication The Onion, posting a series of anti-Israeli "joke" stories and an anti-Obama "meme" image. The Onion returned fire with its own joke story, "Syrian Electronic Army Has A Little Fun Before Inevitable Upcoming Death At Hands of Rebels."
China's military denied renewed U.S. accusations that it sponsored cyberattacks and said the two sides should cooperate against the global threat of computer crime. The annual Pentagon report released Monday included for the first time the accusation that at least some attacks on U.S. government and other computer systems appeared to be "attributable directly" to the Chinese government and military.
A group of senior Republican and Democratic senators have proposed a new law to combat computer espionage and the theft of valuable commercial data from U.S. companies. The four powerful senators — Democrats Carl Levin and Jay Rockefeller and Republicans John McCain and Tom Coburn — joined together to launch the Deter Cyber Theft Act.