government
The FBI is looking for a “malware provider”
In a request for quote (RFQ) published on Monday, the Bureau has explained the reason behind their need: The Operational Technology Division (OTD), Investigative Analysis Unit …
What do government security pros think?
Tripwire and the Government Technology Research Alliance (GTRA) announced the results of a U.S. government cybersecurity survey that evaluated the attitudes and responses of …
How Edward Snowden’s actions impacted defense contractors
A new ThreatTrack Security study sheds light on the attitudes of a very exclusive group of IT and security managers – those employed by U.S. defense contractors – …
GCHQ DoSed Anonymous’ IRC server
British spy agency GCHQ has used Denial of Service attacks against Anonymous, in order to disrupt their communications, their activities, and to lead members of the loosely …
Hackers sue German government for helping NSA spy on its citizens
The Chaos Computer Club (CCC), Europe’s largest hacker association, and the International League for Human Rights (ILMR) are suing the German government for allegedly …
Canadian spy agency used free airport WiFi to track travelers
A new report based on documents provided by NSA whistleblower Edward Snowden will make Canadians question whether the country’s electronic spy agency does, as it claims, …
SpyEye creator pleads guilty
Aleksandr Andreevich Panin, a Russian national also known as “Gribodemon” and “Harderman,” has pleaded guilty to conspiracy to commit wire and bank …
Consumers care more about business data collection than government surveillance
TRUSTe released its latest U.S. Consumer Confidence Index, which shows that a high proportion of U.S. adults aged 18 and older are worried about their privacy online, online …
Feds cloned TorMail server with future investigations in mind
TorMail users engaged in illegal activities might have felt more than a twinge of anxiety when it was confirmed last summer that the FBI took control of Freedom …
Feds take over online counterfeit card webshop, arrest its operators
Three men who allegedly ran a one-stop online shop selling counterfeit credit cards and holographic overlays to be used by criminals to make fake identifications, face federal …
Motivation and techniques of world’s most sophisticated cyber attackers
CrowdStrike released “CrowdStrike Global Threats Report: 2013 Year in Review,” the product of its year-long study of more than 50 groups of cyber threat actors. …
NSA collects 200 million text messages a day
As the world awaits US President Obama’s official announcement of his plans for an NSA reform, The Guardian disclosed details of yet another NSA bulk data collection …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics