fbi - News, Features, and Slideshows
fbi in pictures
Hackers probably gained access to Sony's network last year after a series of phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs, a security expert said today.
By Gregg Keizer | 24 April, 2015 04:47
Real tales of cyberattack response and recovery are hard to come by because organizations are reluctant to share details for a host of legitimate reasons, not the least of which is the potential for negative financial fallout. However, if we never tell our stories we doom others to blindly walk our path. Better to share our real-world battlefield experiences and become contributors to improved threat intelligence.
By By Adrian Newby, CTO, CrownPeak | 15 April, 2015 05:32
A Massachusetts police department paid $500 to free up town files that had been encrypted by CryptoLocker, the ransomware that locks down hard drives until the owners pay up.
By Tim Greene | 08 April, 2015 07:12
Hackers who went undetected for eight months gained wholesale access to medical records and other personal data of the 1.8 million Premera Blue Cross health plan members in Washington State and Alaska as well as anyone who did business with the company.
By Tim Greene | 18 March, 2015 12:42
Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands payment for the decryption key -- and you'll typically get the same answer: "never pay the ransom."
By Colin Neagle | 17 March, 2015 00:59
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
Users of consumer technology and social media reacted quickly after explosions ripped through crowds near the finish line of the Boston Marathon last week, sending out updates, snapping photos and recording videos that officials said could turn out to be critical pieces of evidence.
By Matt Hamblen | 22 April, 2013 10:04
The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
By Ellen Messmer | 10 December, 2012 17:57
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
Over the past several years, we’ve seen business requirements rapidly evolve and technologies continue to advance, yet the way many companies approach disaster recovery remains at a standstill. Tolerance for downtime is at an all-time low, and many organizations — and particularly their users — expect IT services to be “always-on.” Meanwhile, new virtualization and automation technologies have emerged that can help fill gaps in continuity plans, but many organizations have been slow to adopt them, thus widening the gap between business expectations and IT realities.
- Lenovo seeks to be hip 10 years after ThinkPad buy
- Computex focus shifts from PCs to wearables, IoT
- In Pictures: A match made in heaven? 10 tech mergers that defined the industry
- In Pictures: 20 best iPhone/iPad games
- In brief: Lakeside Software opens Sydney office
- Government to push forward on website-blocking before
- New query language could turn log files into business insights
- Apple acquires Metaio with a view to augmented reality
- Government moves to boost mobile broadband spectrum
- Man charged with selling fake discount coupons on Silk Road
- This smart fabric from Google can change the music and turn off the lights
- Fujitsu launches A/NZ security services practice
- Keep your legacy management style out of the Cloud, Intuit exec says
- Google to widen Maps' offline features
- Annual WITI Summit taps into awareness, frustration over lack of women in IT