This year's hacking hall of shame includes members of Anonymous and the Blackhole cybercrime gang, plus state-sponsored groups, according to a list compiled by Information Week. So, who should make the list of the world's most notorious hackers in 2013?
A hacker secretly took over a computer server at the BBC, Britain's public broadcaster, and then launched a campaign on Christmas Day to convince other cyber criminals to pay him for access to the system, according to a Reuters report.
The debate over the NSA's collection of millions of Americans' telephone records fell squarely into the courts when a federal judge in Manhattan upheld the legality of the program, citing its need in the fight against terrorism.
A security hole in popular photo messaging service Snapchat could allow attackers to find the phone numbers of many users in a short period of time, according to Gibson Security, a computer security research group.
2013 has, as always, brought new security threats thanks to the ever-increasing world of cybercrime. We’ve seen Cryptolocker, a type of ransomware that originally targeted businesses, before moving on to attack the more lucrative (and easier) home PC market.
In the wake of last week’s security breach at retail giant Target Corp., the federal government must intensify efforts to protect consumers from cyber-criminals trolling for vital personal and financial information, Sen. Robert Menendez announced Thursday.
Human beings are highly efficient at recognizing familiar faces, even from very poor quality images. New research is using advances in the level of detail available in digital photography to harness this human ability for use in forensics.
On Saturday, James Clapper, the Director of National Intelligence, declassified a set of 10 court documents that show that the Bush and Obama administrations assert that some of the more sensitive NSA surveillance programs should be kept secret.
The accessibility of smartphones and the popularity of apps are making it easier for police to share and receive information from the public. Law enforcement agencies in Maine are using department-managed social media pages to engage with the public.
With an increasing number of cases hinging on complex financial information – and today's technology making those financial crimes and peccadilloes much more difficult to identify – there's a new player emerging as an indispensable part of many attorneys' legal teams: the forensic accountant.
Consumer frustration and outrage over the Target credit card breach is moving from Facebook and Twitter to the courts and state governments even as the stolen accounts are flooding the black market. Three class-action lawsuits have been filed in the wake of the theft of data on about 40 million credit and debit card accounts of shoppers at Target from Nov. 27 to Dec. 15.
It is time for a change in the way the law enforcement works with digital forensic evidence. Every police investigator needs to be able to quickly and easily analyze digital forensic evidence related to their criminal cases—from photos, videos, email, social media and Internet usage to audio and documents.
At least two moderators of the Silk Road 2 user forums have been arrested by authorities in the U.S. and Ireland. A source claiming to have inside knowledge of the arrests said that Libertas, a moderator on the Silk Road 2 forums [TOR link], has been arrested by the Irish Police (Garda Siochana) in Wicklow during a raid. A source at the Wicklow Police has confirmed the arrest of the yet-unnamed moderator.
Secret documents reveal more than 1,000 targets of American and British surveillance in recent years, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.
In the days after the attacks on September 11, 2001, the National Security Agency underwent a transformation from an organization that operated on a "need to know" basis to a "need to share" culture. In the process, the agency threw out many of the procedures and controls that might have stopped Edward Snowden from walking out the door with thousands of secret documents.