fbi - News, Features, and Slideshows
fbi in pictures
Cyber Monday is the biggest online shopping day of the year, which means it is also the single biggest opportunity for criminals to steal cash, personal information and credit card numbers, and they've got an imposing arsenal to carry out their plans against the unwary.
By Tim Greene | 26 November, 2014 13:45
Many people should be wary of Internet ads, especially for large ticket items, but apparently enough folks aren't. The Internet Crime Complaint Center today said over $20 million has been scammed and more than 6,800 complaints have been logged between June 2009 and June 2014 over rip-off ads.
By Michael Cooney | 15 November, 2014 03:58
In security and privacy circles today, no good deed goes unpunished. Consider Apple's recent privacy initiative. Under its new encryption policy, Apple can't divulge confidential information about its customers' data, because only the consumer's credentials can unlock the data -- and those credentials are completely under the control of the customer. For added security, Apple layered biometric authentication (fingerprint) on top, so that people wouldn't have to type their passwords/PINs in public, exposing themselves to the dangers of shoulder-surfing.
By Evan Schuman | 11 November, 2014 21:11
Federal law enforcement agencies in the U.S. and Europe have shut down more than 400 Web sites using .onion addresses and made arrests of those who run them, which calls into question whether the anonymizing The Onion Router (Tor) network itself is still secure.
By Tim Greene | 08 November, 2014 09:17
The FBI this week said it had nabbed one of the agency's Cyber's Most Wanted outlaws -- John Gordon Baden who is charged with stealing the identities of 40,000 people and then using the information to siphon millions of dollars from brokerage or bank accounts.
By Michael Cooney | 06 November, 2014 08:16
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
Users of consumer technology and social media reacted quickly after explosions ripped through crowds near the finish line of the Boston Marathon last week, sending out updates, snapping photos and recording videos that officials said could turn out to be critical pieces of evidence.
By Matt Hamblen | 22 April, 2013 10:04
The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
By Ellen Messmer | 10 December, 2012 17:57
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTStudio Design ManagerVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTProgram Manager - Integration & SolutionsNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTAcquisition Marketing ExceutiveNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
- Close shaves between aircraft and drones on the upswing
- Obama signs legislation allowing regulatory e-labels for smartphones, wearables
- Data retention inquiry to report in early 2015
- Aus government begins review of cyber security strategy
- Communications coalition urges national focus on broadband adoption
- Melbourne IT eyes social media market with Tiger Pistol
- Building a non-distributed big data computing solution on Amazon Web Services
- Pressure mounts in Europe for strict net neutrality
- Use Uber? Snapchat? Google Maps? Now Twitter knows
- Opera pitches all-you-can-eat app stores to mobile operators
- Apple-IBM products in November? Not quite
- Amazon's Fire sale: Phone is now just $199 unlocked
- PoS malware also targeting ticket vending machines and electronic kiosks
- Oracle, Oregon tussle over whether federal court should hear Cover Oregon case
- First robot, networked tablets head to West Africa to fight Ebola