Please turn on your JavaScript for this page to function normally.
Two feds charged for stealing Bitcoin during Silk Road investigation

Two former US federal agents have been charged with wire fraud, money laundering and related offenses for stealing digital currency during their investigation of Silk Road. …

Human error lead to leak of world leaders’ personal information

Personal information, passport numbers and visa details of world leaders who attended the G20 summit in Brisbane, Australia, in November 2014, have been inadvertently leaked …

US tech giants urge Congress to curb mass digital surveillance

As the date of the expiry of Section 215 of the USA PATRIOT Act draws near, a wide range of tech companies, privacy advocates, and trade associations have asked the US …

Premera breach: Are HIPAA standards too low?

Here’s an interesting twist regarding the Premera data breach revealed last week: the company has been deemed compliant with the Health Insurance Portability and …

Protecting the critical infrastructure: Strategies, challenges and regulation

In this interview, Raj Samani, VP and CTO EMEA at Intel Security, talks about successful information security strategies aimed at the critical infrastructure, government …

The Pentagon is looking to hire 3,000 infosec pros

The US Department of Defense has gotten permission and is aiming to hire 3,000 infosec professionals to work at the US Cyber Command by the end of this year, and is set to …

UK: 57 arrested for cyber crime, including US DoD hacker

Last week was a busy one for UK law enforcement, as agents from the National Cyber Crime Unit (NCCU) of the National Crime Agency (NCA) spearheaded a nationwide cyber crime …

US air traffic control system is riddled with vulnerabilities

A recently released report by the US Government Accountability Office has revealed that despite some improvements, the Federal Aviation Administration (FAA) still needs to …

Security framework for governments deploying the cloud

ENISA released a framework structured into four phases, nine security activities and fourteen steps that details the set of actions Member States should follow to define and …

Cisco, Apple, Citrix products no longer welcome on Chinese government systems

A slew of US tech companies have been dropped from China’s Ministry of Finance’s approved government procurement list, including Apple, McAfee, Citrix Systems and …

3 million strong RAMNIT botnet taken down

The National Crime Agency’s National Cyber Crime Unit (NCCU) worked with law enforcement colleagues in the Netherlands, Italy and Germany, co-ordinated through …

Gemalto says NSA and GCHQ intrusions “probably happened”

“The investigation into the intrusion methods described in the document and the sophisticated attacks that Gemalto detected in 2010 and 2011 give us reasonable grounds …

Don't miss

Cybersecurity news