fbi - News, Features, and Slideshows
fbi in pictures
Hackers who went undetected for eight months gained wholesale access to medical records and other personal data of the 1.8 million Premera Blue Cross health plan members in Washington State and Alaska as well as anyone who did business with the company.
By Tim Greene | 18 March, 2015 12:42
Amazon Web Services last year was estimated by Gartner to be five times bigger than its next 14 competitors combined. That's a lot of virtual machines. And they all run on a customized version of the open source Xen hypervisor, so when the Xen code has a security vulnerability, that's a big deal for AWS.
By Brandon Butler | 04 March, 2015 05:25
A U.S. Senator is questioning why the Federal Communications Commission (FCC) approved of a controversial cell phone surveillance device that both federal and state law enforcement agencies are using to track suspects, often without court orders to do so.
By Lucas Mearian | 26 February, 2015 09:39
It probably comes as no surprise that the director of the U.S. National Security Agency wants access to encrypted data on computers and other devices.
By Grant Gross | 24 February, 2015 09:25
Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands payment for the decryption key -- and you'll typically get the same answer: "never pay the ransom."
By Colin Neagle | 17 March, 2015 00:59
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
Users of consumer technology and social media reacted quickly after explosions ripped through crowds near the finish line of the Boston Marathon last week, sending out updates, snapping photos and recording videos that officials said could turn out to be critical pieces of evidence.
By Matt Hamblen | 22 April, 2013 10:04
The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
By Ellen Messmer | 10 December, 2012 17:57
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- FTJunior Media Buyer - Sales CoordinatorNSW
- CCMobile iOS DeveloperNSW
- CCMobile Designer / Developer - IOSNSW
- CC.Net Solution ArchitectNSW
- CCFront End Web Developer (Drupal)NSW
- CCDBA (Oracle/SQL)NSW
- CCMobile Designer / Developer - IOSNSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- CCSenior Systems EngineerNSW
- FTSenior SQL DBANSW
- FT.Net Solution ArchitectNSW
- CCSenior Release EngineerNSW
- FTApplication Support SpecialistNSW
Security is an intrusive mechanism that is often seen to interfere with normal business operations. Nonetheless, security is essential to the normal operation of the business, and the right security mechanisms and approaches can minimize performance degradation.
- Intel could strengthen its server product stack with Altera
- Kleiner Perkins cleared of sex discrimination against Ellen Pao
- Facebook reveals the logic behind its forced Messenger split
- French self-driving car goes for a spin around Paris monument
- Google to bring imaging, sensor technology to the operating room
- 5 freshly-funded cloud computing companies worth watching
- Why Meerkat and Periscope are the next big challenge for marketers
- USB Type-C peripherals are on the way, and storage devices are first up
- Microsoft should forget the Surface, stick to the Pro 2-in-1 line
- Slack hacked, compromising users' profile data
- Congress moves quickly on cyberthreat information sharing
- New mobile-malware detection technique uses gestures
- Google Cloud Launcher deploys VM-based apps in a snap
- Apple Watch mini-stores to open in London, Paris, Tokyo luxury retail shops
- BlackBerry posts second straight earnings gain