NBC foreign correspondent Richard Engel sat down in a coffee shop in Moscow and started up his brand new phone. But "before we even finished our coffee" the hackers had downloaded malware "stealing my information and giving hackers the option to tap or even record my phone calls." Visitors to the Winter Olympics in Sochi should expect to be hacked, but security experts are seriously questioning the veracity of the report.
Three years ago in January, 2011, NIST (the National Institute of Standards and Technology) issued NIST Special Publication 800-131A, setting forth rules and recommendations for the use of certain cryptographic standards. They've just been caught violating one of those rules themselves.
The Syrian Electronic Army (SEA) has claimed that it had owned Facebook. It wasn't quite true in any meaningful way, but SEA came very close to being able to redirect millions of Facebook users to its own websites.
Taking the name, Dread Pirate Roberts, Princess Bride-style, a new operator has restarted the online, underground drug marketplace Silk Road.
India has launched an investigation after a media report alleged that Chinese telecoms company Huawei had hacked into state-run telecoms carrier Bharat Sanchar Nigam, a senior government official said.
Organizations are bombarded with potential threats every day. Most of these are small and irritating, not truly critical - but among those needles are little threads of larger actions at work. An incident response program enables you to pull out the needles that make up the haystack of the big picture.
U.S. officials have warned for years that the prospect of a cyberattack is the top threat to the nation and have sharply increased spending for computer security. Yet the report by the Republican staff of the Senate Homeland Security and Governmental Affairs Committee says that federal agencies are ill-prepared to defend networks against even modestly skilled hackers.
A secret British spy unit created to mount cyber attacks on Britain’s enemies has waged war on the hacktivists of Anonymous and LulzSec, according to documents taken from the National Security Agency by Edward Snowden and obtained by NBC News.
Prolexic Technologies has shared an analysis of nearly a dozen global DDoS attacks that indicates cyber attackers are using DDoS attacks in an attempt to influence market values and interfere with exchange platforms.
President Juan Manuel Santos of Colombia said Tuesday that enemies of his government's efforts to make peace with leftist rebels may have been behind reported spying by members of an elite.
The Chaos Computer Club (CCC), Europe's largest hacker association, and the International League for Human Rights (ILMR) are suing the German government for allegedly helping foreign intelligence agencies spy on German citizens.
Apparently, the old adage about old dogs and new tricks doesn’t always hold up: Old dog GameOver Zeus has learned something new: The criminals behind the malware delivery system for the banking Trojan are now encrypting their executable file so that as it doesn’t trigger common defenses.
The Secret Service has urged U.S. lawmakers to do more to prevent the types of cyber thefts of consumer information that recently have hit Target Corp and other major retailers.
As a graduate student at the MIT, Amit Sahai was fascinated by the strange notion of a “zero-knowledge” proof, a type of mathematical protocol for convincing someone that something is true without revealing any details of why it is true. What if it were possible to mask the inner workings not just of a proof, but of a computer program, so that people could use the program without being able to figure out how it worked?
A new Belgian episode in the NSA scandal: Belgian professor Jean-Jacques Quisquater, internationally renowned expert in data security was the victim of hacking. And, as was the case in the Belgacom hacking affair, there are indications the American secret service NSA and its British counterpart, the GCHQ might be involved.