government
Mistakes that led to the massive Utah data breach
A little over a month ago, the largest data breach in Utah history resulted in the compromise of Social Security numbers of some 280,000 Medicaid and Children’s Health …
FBI wants social networks and IM services to be wiretap-friendly
Worried that technology advances will leave its agents incapable of conducting surveillance of online communications of potential criminals, the FBI is quietly lobbying top …
US House of Representatives passes CISPA
In a move that took the opponents of the proposed Cyber Intelligence Sharing and Protection Act (CISPA) by surprise, the US House of Representatives has voted on the bill a …
Hacktivist group confirms arrest of its leader
One of the two teenagers arrested late last week in the UK has been charged with one count of conspiracy to cause a public nuisance and with one count of violating the …
Stuxnet was planted via infected memory stick
Although it has never been confirmed, the speculation that the Stuxnet worm was manufactured for the express reason of disrupting the production at Iran’s Natanz uranium …
MPAA warns Megaupload could set up shop again
Megaupload founder Kim Dotcom and three of the company’s executives are still waiting to see whether the request for the extradition to the US will be granted by the New …
UK govt to introduce new email and web usage monitoring law
The UK Conservative-Liberal Democratic Coalition government is trotting out a new version of the controversial Interception Modernisation Programme (IMP) that was proposed by …
Researchers link string of breaches to Chinese man
Security researchers rarely managed to trace hacking attacks back to a person or a specific entity, but it seems that Trend Micro experts have succeeded in tying a former …
How much does a 0-day vulnerability cost?
The market for exploits for zero-day vulnerabilities has exploded in the last year, says Adriel Desautels, the founder of Netragard, a penetration testing and vulnerability …
US govt and military email addresses offered for sale
Cyber crooks are very well aware that information is a very lucrative commodity and that every type of information has potential buyers. Take email addresses, for example. …
Is Ukraine the perfect place for hackers?
What is it that makes the Ukraine such a fitting refuge for hackers and cyber crooks? According to a number of well-informed individuals, it is a combination of inadequate …
DARPA director leaves the agency for Google
Regina Dugan, the first female director of the Defense Advanced Research Projects Agency (DARPA), has been offered and has accepted a “senior executive position” …