The FBI’s formidable Next Generation Identification is up and running
fbi - News, Features, and Slideshows
fbi in pictures
Faced with few options, companies are increasingly ceding to cyberattackers' demands for payment after holding their stolen data hostage, while law enforcement struggles to catch nearly invisible foes.
A panel of distinguished cryptographers says letting law enforcement have access to encrypted communications means more vulnerabilities for criminals to exploit and less secure corporate networks.
The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the carefully constructed defenses.
Would you believe there are people so interested in Apple and all of its works that they want to know what's going on with the next generation of the iPhone <em>before it even comes out</em>? My editors assure me that this is the case. So, despite the obvious lunacy of the idea I mean, surely it's enough to know that there will probably be another one coming out at some point, right? I am stepping in to provide you with the latest scuttlebutt on what may or may not be the iPhone 7.
Hackers probably gained access to Sony's network last year after a series of phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs, a security expert said today.
In recent months the news of Chris Roberts alleged hacking of an inflight entertainment system and possibly other parts of the Boeing 737 have sparked a wave of controversy. Public opinion was originally on Roberts' side, but the recent publication of the FBI affidavit changed that drastically. According to the affidavit, Roberts admitted to doing a live "pen-test" of a plane network in mid-air.
Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands payment for the decryption key -- and you'll typically get the same answer: "never pay the ransom."
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
Users of consumer technology and social media reacted quickly after explosions ripped through crowds near the finish line of the Boston Marathon last week, sending out updates, snapping photos and recording videos that officials said could turn out to be critical pieces of evidence.
The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
- Jetstar talks 'How To' on collaboration tools and PwC plan & refine your collaboration journey | Save your seat today
- Help us better understand the trends and major practices related to technology use in STEM education. Take this two minute survey NOW.
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- APJ businesses think they will be breached: Here's why: Read the article NOW
- F5 Security Hub NEW Look - Try us out today
- NEW Gigamon Transform Security Zone - Find out more now!