government
The Crime-as-a-Service business model
A service-based criminal industry is developing, in which specialists in the virtual underground economy develop products and services for use by other criminals. This …
Federal regulations on cyber security lead to revenue loss
Even though 87 percent those surveyed in the financial service industry agree that current regulatory changes are very important or critical to keeping their companies and …
Apple drops the “warrant canary” from transparency report
In the wake of the change of Apple’s Privacy Policy, and the encryption technology used in iOS 8 that makes it “not technically feasible” for Apple to …
With iOS 8, Apple won’t be able to unlock phones for the police
With the release of iOS 8, Apple has also updated its Privacy Policy. “The changes were made predominantly to cover new features in iOS 8, or to provide additional …
Hackers penetrated systems of key defense contractors
Hackers associated with the Chinese government successfully penetrated the computer systems of U.S. Transportation Command contractors at least 20 times in a single year, …
Video: Reactions of engineers under GCHQ surveillance
Filmmakers Katy Scoggin and Laura Poitras follow reporter Marcel Rosenbach as he informs the staff of a German communications firm that they have been targeted for …
Yahoo’s fight against US govt secret surveillance revealed
Unsealed documents from Yahoo’s challenge to the expansion of US surveillance laws in 2007 and 2008 have shown how the company was ultimately made to comply to the US …
Microsoft refuses to hand over emails stored in Ireland, held in contempt by judge
Microsoft has urged US District Judge Loretta Preska, the judge presiding over the case that sees the company refusing to hand some emails stored in its Dublin facility over …
FBI’s account of locating Silk Road’s server disputed by researchers
The US government’s explanation of how it managed to discover the location of the servers hosting Silk Road, the infamous online black market, is being disputed by a …
HealthCare.gov breach affected test server, not users
A server within the Healthcare.gov system has been compromised, but the good news is that it didn’t contain consumer personal information. It was just a development …
DHS urges website admins to minimize risk of Google hacking
It’s a widely known fact that Google Search is a valuable tool for attackers looking for a way into organizations’ information systems. “Google …
FBI investigating JPMorgan, US banks breaches
In the wake of reports that several big US financial institutions have had their networks compromised by hackers this month, the FBI and the Secret Service have mounted an …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics