New York's financial regulator says his agency will focus on cybersecurity over the next year, saying the possibility of a systemic attack to the financial system is one thing that keeps him awake at night.
In a big step for securing critical information systems, such as medical records in clinical settings, researchers have created a new approach to computer security that authenticates users continuously while they are using a terminal and automatically logs them out when they leave or when someone else steps in to use their terminal.
Financial cybercrime Trojans, originally used to steal credentials from online banking users, are increasingly being used for espionage purposes.
After a security incident is detected tremendous resources are spent in the forensic investigation trying to figure out what exactly happened and what data, if any, was compromised. If the forensic investigation doesn’t yield definitive results fairly quickly the organization is left with no choice but to assume the worst.
The risks were clear to computer experts inside Home Depot: The home improvement chain, they warned for years, might be easy prey for hackers.
In many cases, the American judicial system doesn’t view an encrypted phone as an insurmountable privacy protection for those accused of a crime. Instead, it’s seen as an obstruction of the evidence-gathering process, and a stubborn defendant or witness can be held in contempt of court and jailed for failing to unlock a phone to provide that evidence.
Australia's peak intelligence agency is stepping up its analysis of terrorist threats, including scouring social media to track extremist propaganda and recruitment efforts.
The next generation of Google’s Android operating system, due for release next month, will encrypt data by default for the first time, the company said Thursday, raising yet another barrier to police gaining access to the troves of personal data typically kept on smartphones.
A reminder to iPhone owners cheering Apple’s latest privacy win: Just because Apple will no longer help police to turn your smartphone inside out doesn’t mean it can prevent police from vivisecting the device on their own.
Researchers at Missouri University of Science and Technology are working to combat threats to cybersecurity by training the next generation of experts in the field. With a $3 million grant from the National Science Foundation, Missouri S&T’s computer science department will fund approximately 16 “Scholarship for Service” master of science and Ph.D. students, who will specialize in cybersecurity.
The Citadel trojan, a popular program used by cyber criminals to gather banking credentials and steal money from accounts, has become the latest financial malware to be repurposed as a tool to steal industrial secrets — this time from petrochemical companies in the Middle East.
Philippine authorities arrested 43 suspected members of a syndicate that runs a lucrative online cybersex operation catering to clients worldwide, officials said Thursday.
Ten years ago the US Navy invented Tor, an anonymous web browser. Now the ‘dark net’ is used to trade guns, drugs and child pornography, do its creators have any regrets?
In the digital drug trade as in the physical one, taking out one kingpin only makes room for another ready to satisfy the market’s endless demand. In the case of the FBI’s takedown of the Silk Road, the latest of the up-and-coming drug kingpins is far more evolved than its predecessor — and far less principled.
China's military hacked into computer networks of civilian transportation companies hired by the Pentagon at least nine times, breaking into computers aboard a commercial ship, targeting logistics companies and uploading malicious software onto an airline's computers, Senate investigators say.