A cross-site scripting bug in Twitter's TweetDeck tool caused trouble for many users, and potentially opened up many other users to XSS attacks.
Ars Technica's Sean Gallagher partnered with NPR tech correspondent Steve Henn for an experiment in Internet surveillance. For one week, while Henn researched a story, he allowed himself to be watched — acting as a stand-in, in effect, for everyone who uses Internet-connected devices. How much of our lives do we really reveal simply by going online?
The tightly integrated computing and networking systems required to turn the nation’s freeways into “smart transportation systems” are currently under development. But they have a worrisome downside: They are vulnerable to cyber attacks by criminals, terrorists or hostile nations.
Investigators in Las Vegas are studying YouTube videos and a range of other social media posts by Jerad Miller, as they try to untangle what led him and his 22-year-old wife to gun down two police officers and a civilian before taking their own lives.
When Ashleigh Girodat collects her BA in criminology in June she will have already made her mark in the fight against cyber crime. As part of a research team at SFU’s International Cybercrime Research Centre, Girodat analyses data from a web crawler that scans the open web for child-exploitation content.
Cellebrite, developer and provider of mobile data forensic solutions, has announced that its Cellebrite UFED Touch has won the Forensic 4:cast Award for Phone Forensic Hardware of the Year, and its UFED Physical Analyzer has won Phone Forensic Software of the Year.
After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers.
Apple unveiled the iPhone in June 2007, a month after the National Institute of Standards and Technology issued "Guidelines on Cell Phone Forensics." Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."
Investigators said they have identified a secretive hacking group that has spent years systematically targeting US partners in the space and satellite industry, most likely on behalf of the Chinese military. The group, dubbed as Putter Panda, is connected to Unit 61486 of the People Liberation Army.
After hackers played several high-profile pranks with traffic signs, including warning San Francisco drivers of a Godzilla attack, the U.S. government advised operators of electronic highway signs to take "defensive measures" to tighten security.
Cyber crime has a significant impact on economies worldwide. A new report from the Center for Strategic and International Studies (CSIS) concludes that cyber crime costs businesses approximately $445 billion worldwide, with an impact on approximately 150,000 jobs in the EU and 200,000 jobs in the U.S.
The town manager of a hamlet in south eastern New Hampshire has defied demands that he pay a ransom to recover police department computer files taken hostage by Cryptowall, a newer piece of malware that encrypts hard drive contents of infected machines until victims pay for them to be decrypted.
Germany's foreign intelligence agency has officially lifted the lid on some of its worst-kept secrets, acknowledging that half a dozen facilities around the country are in fact spy stations — as anyone with Internet access could already figure out.
The UK government has said it wants to hand out life sentences to anyone found guilty of a cyber attack that has a catastrophic effect, under plans announced in the Queen's speech.
The world's second-biggest mobile phone company Vodafone revealed government agencies in six unidentified countries use its network to listen to and record customers' calls, showing the scale of telecom eavesdropping around the world.