Hackers have threatened to expose the details of over 600,000 Dominos Pizza customers after hacking the firm’s website.
US restaurant chain P.F. Chang's China Bistro plans to temporarily bring back manual credit card imprinting while it investigates a security breach that allowed hackers to steal customer payment card data from multiple stores.
The U.S. government plans to auction about 30,000 bitcoin, the electronic currency, valued at about $17.4 million, on June 27 the U.S. Marshals Service said. The bitcoin were seized during an FBI raid in October on the Internet marketplace Silk Road, known as a hub for transactions involving illegal drugs and criminal activities.
A Romanian man is facing charges that he hacked into Facebook and email accounts of former high-ranking U.S. government officials and a relative of two former presidents.
More than one-third of cyber attacks take hours to detect. Even more alarming, resolving breaches takes days, weeks, and in some cases, even months.
The University of Alabama’s department of criminal justice, in conjunction with The University of Alabama Police Department, recently received a $60,000 grant from the Alabama Department of Economic and Community Affairs to start a digital forensics crime lab at UA.
A cross-site scripting bug in Twitter's TweetDeck tool caused trouble for many users, and potentially opened up many other users to XSS attacks.
Ars Technica's Sean Gallagher partnered with NPR tech correspondent Steve Henn for an experiment in Internet surveillance. For one week, while Henn researched a story, he allowed himself to be watched — acting as a stand-in, in effect, for everyone who uses Internet-connected devices. How much of our lives do we really reveal simply by going online?
The tightly integrated computing and networking systems required to turn the nation’s freeways into “smart transportation systems” are currently under development. But they have a worrisome downside: They are vulnerable to cyber attacks by criminals, terrorists or hostile nations.
Investigators in Las Vegas are studying YouTube videos and a range of other social media posts by Jerad Miller, as they try to untangle what led him and his 22-year-old wife to gun down two police officers and a civilian before taking their own lives.
When Ashleigh Girodat collects her BA in criminology in June she will have already made her mark in the fight against cyber crime. As part of a research team at SFU’s International Cybercrime Research Centre, Girodat analyses data from a web crawler that scans the open web for child-exploitation content.
Cellebrite, developer and provider of mobile data forensic solutions, has announced that its Cellebrite UFED Touch has won the Forensic 4:cast Award for Phone Forensic Hardware of the Year, and its UFED Physical Analyzer has won Phone Forensic Software of the Year.
After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers.
Apple unveiled the iPhone in June 2007, a month after the National Institute of Standards and Technology issued "Guidelines on Cell Phone Forensics." Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."
Investigators said they have identified a secretive hacking group that has spent years systematically targeting US partners in the space and satellite industry, most likely on behalf of the Chinese military. The group, dubbed as Putter Panda, is connected to Unit 61486 of the People Liberation Army.