fbi - News, Features, and Slideshows
fbi in pictures
A panel of distinguished cryptographers says letting law enforcement have access to encrypted communications means more vulnerabilities for criminals to exploit and less secure corporate networks.
By Tim Greene | 08 July, 2015 02:18
The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the carefully constructed defenses.
By Tim Greene | 22 June, 2015 20:29
Would you believe there are people so interested in Apple and all of its works that they want to know what's going on with the next generation of the iPhone before it even comes out? My editors assure me that this is the case. So, despite the obvious lunacy of the idea I mean, surely it's enough to know that there will probably be another one coming out at some point, right? I am stepping in to provide you with the latest scuttlebutt on what may or may not be the iPhone 7.
By Jon Gold | 22 June, 2015 08:13
Hackers probably gained access to Sony's network last year after a series of phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs, a security expert said today.
By Gregg Keizer | 24 April, 2015 04:47
Real tales of cyberattack response and recovery are hard to come by because organizations are reluctant to share details for a host of legitimate reasons, not the least of which is the potential for negative financial fallout. However, if we never tell our stories we doom others to blindly walk our path. Better to share our real-world battlefield experiences and become contributors to improved threat intelligence.
By By Adrian Newby, CTO, CrownPeak | 15 April, 2015 05:32
Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands payment for the decryption key -- and you'll typically get the same answer: "never pay the ransom."
By Colin Neagle | 17 March, 2015 00:59
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
Users of consumer technology and social media reacted quickly after explosions ripped through crowds near the finish line of the Boston Marathon last week, sending out updates, snapping photos and recording videos that officials said could turn out to be critical pieces of evidence.
By Matt Hamblen | 22 April, 2013 10:04
The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
By Ellen Messmer | 10 December, 2012 17:57
Cloud, big data and analytics, mobile, social, and IT security have impacted networking – bringing it almost to breaking point. This whitepaper looks at the future of networking to accommodate these evolving trends.
A February 2013 research study revealed some telling statistics among CIOs and Senior IT Managers about the state of their managed data. Most notably: Mobile access to company data is of paramount importance, Large enterprises are having trouble locating data across their databases, IT teams are overburdened, and business decisions are being hampered by time spent managing data silos. Organizations express interest in a solution that enables them to protect, manage and access all data across the enterprise from a single platform. Discover what IT leaders like yourself have expressed as their biggest challenges when it comes to managing data today, and arm yourself with the tools to change the data management game inside of your organisation.
- What you can learn from Nordstrom's use of the cloud
- Windows 10 roll-out will break Internet traffic records
- The Upload: Your tech news briefing for Tuesday, July 28
- Test like crazy for Java happiness, report says
- OnePlus refines its successful formula with new phone
- Brinks safe can be hacked with just a USB stick
- Samsung event in August portends new smartphone launch
- Amazon takes on MySQL with Aurora
- Over 10 million Web surfers possibly exposed to malvertising
- Car and pedestrian collision? There'll soon be an app for that
- Windows 10 adds full support for Canadian French, Mexican Spanish
- To see benefits, heath wearables must keep people engaged
- Someday your phone may stop an oncoming car
- NSA will lose access to 'historical' phone surveillence data Nov. 29
- Microsoft fixes crash-bug in Windows 10 just days before launch