fbi - News, Features, and Slideshows
If you are good at research by using Google searches, does that make you a malicious cyber actor? Of course not, but DHS, FBI and NCTC (National Counterterrorism Center) have issued a bulletin warning about malicious "Google dorking" cyber actors. If using advanced search techniques on Google or Bing is considered suspicious, what does that make Shodan users who specifically target SCADA, ICS, VoIP, routers, switches, webcams and printers to name but a few?
By Darlene Storm | 27 August, 2014 02:40
U.S government agencies will work to release cyberthreat information faster to the health-care industry after a massive breach at hospital operator Community Health Systems, representatives of two agencies said.
By Grant Gross | 22 August, 2014 04:02
A former Microsoft finance manager was sentenced to two years in federal prison Friday after pleading guilty to an insider trading scheme that netted he and a partner more than $400,000.
By Gregg Keizer | 11 August, 2014 21:39
More than 40 privacy, civil rights and religious groups have called on President Barack Obama's administration to provide a "full public accounting" of long-time email surveillance of prominent Muslims living in the U.S., following a news report detailing the spying by the U.S. National Security Agency and FBI.
By Grant Gross | 10 July, 2014 05:03
For more than a year, the I Internet Crime Complaint Center (IC3) is warning businesses to be on the lookout for growing scam that tricks them into paying invoices from established companies that look legitimate but in fact are fraudulent.
By Michael Cooney | 28 June, 2014 03:58
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
Users of consumer technology and social media reacted quickly after explosions ripped through crowds near the finish line of the Boston Marathon last week, sending out updates, snapping photos and recording videos that officials said could turn out to be critical pieces of evidence.
By Matt Hamblen | 22 April, 2013 10:04
The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
By Ellen Messmer | 10 December, 2012 17:57
UXC Connect’s Jesmond Psaila says that DevOps can do for IT operations what Agile did for software development. This paper demonstrates how, by combining both approaches, you can significantly improve operational efficiency and time-to-market. • Marketing and development teams want to constantly change or increase functionality, while IT operations teams want to keep the environment as stable as possible • Agile software development and virtualisation have not solved the time-to-value problem faced by marketing and IT operations teams • Recent movements in DevOps aim to address and redefine a more agile service management platform, while new tools have vastly improved functionality to configure and automate common processes
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
- FTSenior Media TraderNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTChief Information OfficerNSW
Existing IT operational models and an ageing infrastructure are CIOs back from their full potential. This paper reveals the three IT imperatives for a CIO-led transformation, and details how CIOs are adopting strategies to change IT and assert their organisations as business leaders and innovators.
- Germany's IFA show, debut ground for numerous new products, hits 90 years old
- Amid dueling lawsuits, state needs Oracle's help with health-insurance site transition
- First mobile device with MIPS 64-bit processor coming in 2016
- Four smartphone OSs fighting for survival
- AMD's new eight-core FX chips based on aging Piledriver architecture
- Uber vows to defy German ban on its UberPop ride-sharing service
- In earthquakes, alerts may turn machines into action heroes
- Should you buy enterprise applications from a startup?
- Microsoft's Australian Azure region 'just around the corner'
- Healthdirect Australia sees value in open source for security solution
- Namecheap says accounts compromised in hacking incident
- Why hackers may be stealing your credit card numbers for years
- Quickflix suffers $10m loss
- Web Marketing Experts to create 115 new jobs in Melbourne
- Comms Alliance backs website blocking in piracy fight