Canadian police confirmed an arrest has been made in the Netherlands in the case of a Canadian teenager who was blackmailed into exposing herself in front of a webcam. The 15-year-old later committed suicide after detailing her harassment on a YouTube video watched by millions around the world.
A new global DDoS attack report from Akamai shows that in Q1 DDoS attackers relied less upon...
Police officers trying to find out who was behind a fake Twitter account set up in the name of...
Sweetie looks much like other unfortunate young Filipinas. But unlike her peers, Sweetie is a...
Each social media platform is different, with unique code and variations. Each one runs on its own hardware and software platform, and some, such as Facebook, have even developed custom technology to run their sites. Because of that, each requires its own method of forensically collecting data.
A series of bots have invaded the Android version of dating app Tinder, and are spreading dangerous downloads after luring users with tempting profiles and pictures stolen from an Arizona-based photography studio.
Authorities around the world should set up emergency communication teams to manage the amount of misinformation circulating on social media during disasters, terrorist attacks and other social crises.
I recently encountered a botnet targeting Android smartphone users who bank at financial institutions in the Middle East. The crude yet remarkably effective mobile bot that powers this whole operation comes disguised as one of several online banking apps, has infected more than 2,700 phones, and has intercepted at least 28,000 text messages.
Twitter accounts can cost more to purchase than a stolen credit card because an individual’s account credentials potentially have a greater yield.
A recent post points out that the Facebook generation are increasingly putting their lives online — posting information about who they are, where they are, what they're doing and who they're with — the very information that organizations often go to great lengths to protect.
NSFOCUS has released its DDoS Threat Report 2013, which details attack trends and methodologies over the past year. The report expands on the top 10 findings released in February to include statistical analysis and key observations based on the 244,703 DDoS incidents.
So are we trying to protect privacy based on past social values? Are we old-fashioned in trying to keep a lid on the social media generation?
A new bot with the name Zorenium has landed in the criminal underground, with the ability to target Apple iOS devices like iPhone and iPad. It's not widely known, nor is it widely detectable.
Turkey's courts have blocked access to Twitter days before elections as Prime Minister Tayyip Erdogan battles a corruption scandal that has seen social media platforms awash with alleged evidence of government wrongdoing.
In today’s world of social media, investigators are taking on a new role; they are becoming a form of eyewitness. As the eyewitness, an investigator observes evidence that might not be visible to any other available investigator. The investigator is wise to create a record of what he or she sees at any particular point in time, including print outs of screenshots.
The US has busted a massive child abuse image ring running on the Darknet's Onion router, aka Tor.
Investigators have identified more victims of a botnet that collects payment card data and other sensitive information by preying on websites running poorly secured installations of Adobe's ColdFusion Web server platform.
A United Nations photograph showing a sea of hungry Palestinians awaiting emergency food amid the detritus of their bomb-ravaged neighborhood near Damascus has been retweeted more than eight million times in the past few weeks, becoming such an arresting image of the Syrian civil war that some blogosphere skeptics have suggested that it was digitally faked.
Some of those who have lost bitcoins in the collapse of Mt. Gox have turned to internet sleuthing to find out where their money has gone — but they're unlikely to have much luck.
Police may soon have a new way to catch pedophiles who distribute child abuse photos anonymously online. The technology could also identify smartphone thieves who take pictures with the stolen gadgets and then post their snapshots on the Internet.
Researchers have developed attack code that completely bypasses Microsoft's zero-day prevention software, an impressive feat that suggests criminal hackers are able to do the same thing when exploiting vulnerabilities that allow them to surreptitiously install malware.
Cyber criminals have infected hundreds of thousands of computers with a virus called "Pony" to steal bitcoins and other digital currencies, in the most ambitious cyber attack on virtual money uncovered so far, according to security firm Trustwave.
Men who have seen and suffered the horrors of combat steel themselves each day for a job some find just as wrenching: fighting child sex crimes back home.
Popular domain registrar and web hosting service Namecheap has been having trouble with an unexpected DDoS attack targeting 300 or so domains on two of their DNS nameservers.
Building a botnet typically involves infecting a PC. But at the upcoming RSA Conference, two researchers plan to show how to build one with free cloud services.
A distributed denial-of-service attack targeting a client of the content delivery network Cloudflare reached new highs in malicious traffic today, striking at the company’s data centers in Europe and the US. According to a Twitter post by Cloudflare CEO Matthew Prince, the full volume of the attack exceeded 400 gigabits per second—making it the largest DDoS attack ever recorded.
Prolexic Technologies has issued a high alert DDoS attack threat advisory on the DNS Flooder v1.1 toolkit. The toolkit makes it faster and easier for malicious actors to launch crippling reflection attacks and will likely be widely adopted in the DDoS-as-a-Service market, potentially increasing the number of attacks.
Stepping up to fight the cyber war, Microsoft unveiled a new state of the art Cybercrime Center specifically designed to battle botnets, malware and other various forms of internet crime. Inside its new headquarters, Microsoft’s Digital Crimes Unit (DCU) is actively disrupting some of the most serious cybercrime threats currently facing modern society.
Researchers have uncovered a piece of botnet malware that is capable of infecting computers running Windows, Mac OS X, and Linux that have Oracle's Java software framework installed. The cross-platform HEUR:Backdoor.Java.Agent.a, takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June.
- Page 1