Hugo Teso, a security consultant at n.runs AG in Germany, talks about the completely realistic scenario of plane hijacking via a simple Android app.
Every week, a group of teenagers and 20-somethings dressed in hoodies gets together in a tiny room on a college campus to train to become "white-hat" hackers, experts to help business and government agencies protect their data from cyber attacks that have become an almost daily occurrence.
Have a plan to steal millions from banks and their customers but can't write a line of code? Want to get rich quick off advertising click fraud but "quick" doesn't include time to learn how to do it? No problem. Everything you need to start a life of cyber crime is just a few clicks (and many more dollars) away.
President Barack Obama has proposed increased spending to protect U.S. computer networks from Internet-based attacks in a sign that the government aims to put more resources into the emerging global cyber arms race.
A grieving Canadian mother has said her daughter hanged herself after she never recovered from an alleged rape by four teenage boys that left her deeply depressed and bullied in her community.
The federal government increasingly is concentrating diplomatic efforts on protecting Americans from hackers, but less is said about foreign allies who are equally mobile and even more vulnerable. Now, the State Department is paying attention.
The South Korean government is pointing a finger toward Pyongyang in its assessment of last month's cyber attacks on banks and media companies that affected thousands of computers and took electronic banking sites and ATM networks offline.
When they first began pinging across the Internet, bitcoins could buy you almost nothing. Now, there's almost nothing that bitcoins can't buy. From hard drugs to hard currency, songs to survival gear, cars to consumer goods.
Hacking that originates inside China is undermining its relationship with the United States and harms Beijing's long-term interests, a U.S. diplomat said, in the latest high-level public expression of concern over a problem that has prompted threats of commercial retaliation from Washington.
Muted guilty pleas were a far cry from the brassy Lulzsec rhetoric heard in 2011 as the group took down one high-profile target after another.
The Royal Military Police (RMP) Service Police Crime Bureau (SPCB) has cut its case backlog by 42 percent and reduced costs per initial case by nearly one-third using distributed processing technology.
The University of North Carolina at Chapel Hill's School of Information and Library Science (SILS) has received a $456,000 grant from the Andrew W. Mellon Foundation to support the second phase of the BitCurator project, to develop, distribute and integrate open source forensic software tools to manage and preserve digital archives.
Targeted sanctions are particularly well suited to address the threats posed by cyber attacks and cyber theft, and they could form an important part of a larger strategy to mitigate the problem.
A legal fight over the government’s use of a secret surveillance tool has provided new insight into how the controversial tool works and the extent to which Verizon Wireless aided federal agents in using it to track a suspect.