Brown, a writer and activist who is known as one of the online faces of Anonymous, faced charges related to sharing a link to a dump of credit card numbers connected to the Stratfor breach.
A police department used a "stingray" cell phone tracking device without a judge-issued warrant to pinpoint a suspected criminal's location.
Privacy experts held a candid talk on government methods for obtaining citizen information, and on how the industry can help buffer unfettered data collection.
In light of the RSA-NSA controversy, a number of speakers, who originally planned to speak at RSA Conference 2014, pulled out and formed a lineup for TrustyCon.
Cyber security guru Richard Clarke and General Michael Hayden discussed the much-maligned NSA spying program during the RSA Conference.
Christopher Soghoian, of the ACLU (American Civil Liberties Union), concluded his speech at BSides San Francisco with the observation that developers building encryption models need to consider the US government a threat.
Richard Clarke kicked off the CSA Summit 2014 by discussing his observations about the NSA surveillance controversy.
The need for cyber threat intelligence sharing is still vital, and with Congress sidelined, it's going to take leadership from the nation's corporate executives to make progress on this issue within the framework of our current laws.
On Wednesday, NIST published the 41-page guidance after months of feedback from the community.
Northern Ireland's Department of Justice has been handed a fine of more than $240,000 by the Information Commissioner for a data breach that involved the personal information of terrorist attack victims.
Whistleblower Edward Snowden used a simple and low-cost web crawler to tap into the troves of government data he leaked.
The new security implementation would be mandatory by Jan. 1, 2015. All phones sold in California after that date would have to have a kill switch installed.
Following the new rules regarding transparency reports by Department of Justice, the social media giant believes further information should be shared, and may seek legal options to protect its First Amendment rights.
Google must post a notice on its French homepage stating that it has been fined more than $200,000 for privacy violations.
A new bill approved by Turkish Parliament will ensure government control over the internet.
An NBC News reporter set up two laptops and a smartphone in Russia to demonstrate Olympics cyber threats.
U.S. intelligence agencies were concerned that developers, with ties to Belarus, helped "produce the website," The Washington Free Beacon reported.
The Bank of England has released the results of Waking Shark II, a Nov. 12, 2013, four-hour simulated cyber attack in London involving hundreds of financial institutions that was designed to test the city's cyber security readiness.
In a Tuesday report, Sen. Tom Coburn noted numerous government oversights pertaining to securing sensitive data and critical infrastructure operations.
A security firm highlighted the ways that U.S. defense contractors have reassessed their security programs to stave off insider threats.
European hacker association Chaos Computer Club is suing the German government for allegedly breaking the law and aiding foreign intelligence agencies to spy on citizens.
A group of technology industry experts will meet this Thursday to discuss facial recognition technologies and take the first steps toward establishing guidelines for future technology.
After winning a battle against the U.S. Department of Justice, some of the biggest technology and internet corporations began releasing updated transparency reports on Monday.
The continued leak of classified government intelligence documents by Edward Snowden draws into question the balance of offensive and defensive capabilities of governments.
Global consensus on data breach legislation is still evolving, but fear of brand damage is pushing reform, reports James Hale.
After a quiet year on the advanced malware front, we could soon see more activity, says the Atlantic Council's Jason Healey. Karen Epper Hoffman reports.
This time, Snowden leaks reveal the spy tactics of a communications intelligence agency in Canada, which leveraged Wi-Fi in a major airport to track travelers' comings and goings.
The FBI alerted Ohio-based State Industrial Products that the personal information of an undisclosed number of current and former employees may be at risk.
The U.S. Department of Justice is investigating retail chain Target's recent data breach. U.S. Attorney General Eric Holder confirmed the department's involvement in a Senate Judiciary Committee hearing.
The National Security Agency hired its first privacy and civil liberties officer this week in response to an order from President Obama.
The news comes in response to November claims that Parliament members' communications were being monitored by U.S. spies.
The news comes soon after President Obama called for the government to be more forthcoming about requests it makes for service provider data.
The FBI has arrested five United States email hacking operators and customers as part of a worldwide operation involving Romania, India and China.
Widely used apps, like Angry Birds, and mobile platforms for Facebook, Twitter and other social networking services, were a target for the NSA, leaks reveal.
An advanced remote access trojan known as Xtreme RAT has been identified by Seculert Research Lab as the malware used in an attack on Israeli organizations that impacted 15 machines.
Edward Snowden's stay in Russian could be longer than expected after a Russian legislator alluded to the country possibly extending his asylum.
Verizon is the first major carrier to publish a transparency report detailing federal, state and local requests for user data.
The Federal Trade Commission has charged 12 companies with falsely claiming to comply with the U.S.-EU Safe Harbor Framework.
Researchers have revealed that Russia is behind hundreds cyber espionage campaigns targeting American, European and Asian companies.
The Department of Veterans Affairs eBenefits website experienced a software defect that possibly resulted in a compromise of medical and financial information.
On Friday, President Obama gave his attorney general and the NSA 60 days to determine how the trove of phone data will be held moving forward.
Target, as well as law enforcement officials and other witnesses, will testify in front of the Commerce, Manufacturing, and Trade subcommittee in the first week of February to discuss data breaches and their effect on consumers.
The National Cybersecurity and Critical Infrastructure Protection Act of 2013 was introduced last month in a bipartisan effort by four lawmakers.
Anyone designing a new system such as this should take security into account from the beginning. The amount of personal information that could be harvested by any breach is truly alarming.
In the study, 31 percent of respondents admitted to using public Wi-Fi on work-related mobile devices, while 52 percent failed to use multi-factor auth or data encryption methods to secure data.
Classified government documents revealed how the intelligence agency even targets computers not connected to the internet.
The House of Representatives banded together to pass the Health Exchange Security and Transparency Act, which mandates two-day notification where PII is compromised under the Patient Protection and Affordable Care Act.
National Security Agency surveillance has done little to stop terrorism, according to a study released on Monday by New America, a public policy institute.
A year after his suicide, eight lawmakers have tapped the Department of Justice about unanswered questions regarding Aaron Swartz's "aggressive prosecution."
President Barack Obama met yesterday with senior lawmakers to discuss ending the National Security Agency's surveillance of Americans' telephone records.
Credo Mobile published its transparency report before major carriers Verizon and AT&T, which claimed reports from its companies would come early this year.
State agencies would be banned from helping warrantless snooping, along with corporations that provide services to the state of California.
A Vermont senator has once again brought a bill to Congress that, if passed, would establish a national standard for data breach notification, as well as toughen up penalties for computer hacking crimes.
The RSA Conference is set to convene the last week in February, but several respected researchers and experts have canceled their appearances.
The Office of the Data Protection Commissioner (ODPC) is looking into the incident, after having received many complaints from British customers.
The Communications Security Establishment Canada (CSE) has admitted that it "may incidentally intercept Canadian communications or information."
Some of Canada's best-known authors - including Margaret Atwood, Yann Martel and John Ralston Saul - added their names to an online petition condemning mass surveillance by governments and corporations.
Federal Court of Canada Judge Richard Mosley has slammed the Canadian Security Intelligence Service (CSIS).
The Foreign Intelligence Surveillance Court ruled on Friday that the government can continue collecting phone metadata, which includes numbers dialed and the time and duration of calls.
The editorial board of the New York Times published an opinion piece on Wednesday calling for clemency for Edward Snowden.
A physics expert believes the agency isn't any further along in its efforts than other research entities, especially considering its open ties with the academic world.
The tech giant responded to Snowden leaks on "Dropout Jeep," an NSA program focused on retrieving iPhone users' data.
Three senators have asked that a congressional hearing on consumer data security be held as soon as possible.
Some of the top technology companies - whose products have been reported by a Germany-based news group as containing NSA backdoors - have denied allegations of being involved and are conducting investigations.
The vulnerability discovered by an Israeli security researcher affects Samsung's Galaxy S4 device, which is currently used by government agencies.
Believing the RSA and NSA have entered into a secret agreement, longtime RSA speaker Mikko Hypponen announced Monday that he would be canceling his session at RSA Conference USA 2014.
The FBI reportedly sent out warning notices on Christmas Eve that the Syrian Electronic Army was phishing for usernames and passwords, which the group denied on Twitter.
While year-end security predictions generally fail at accurately predicting much that wasn't an already a foregone conclusion, they're really more about we know right now, and there is value in that.
RSA has quickly denied allegations it used a flawed encryption formula in its products after entering into a $10 million secret contract with the National Security Agency.
Verizon and AT&T announced within 24 hours of each other that both telecommunications companies would be releasing semi-annual transparency reports with regard to government requests for customer information.
A newly released report offers pointed recommendations to curb the NSA's privacy-invading tactics, but real progress lies in the implementation, privacy experts say.
Leaked Snowden documents, detailed today by Reuters, shed light on a $10 million contract.
The state of Washington's Department of Social and Health Services' Economic Services Administration (ESA) is notifying up to 7,000 clients that their personal information may have been compromised.
Kurt DelBene will now serve as a senior advisor to the Secretary of Health and Human Services, replacing Jeff Zients, who previously managed healthcare.gov.
In a bid to cut down on costs and eliminate potential misuse, NSS Labs has put forth an initiative imploring vendors to purchase vulnerabilities.
Brazilian authorities removed the front of a sham ATM in São Paulo and uncovered the real one behind it, as well as a new take on a classic skimming operation.
Almost 19,000 current and former Colorado state workers may have had personal information compromised after a worker lost an unencrypted thumb drive containing the data.
Roughly 54 million Turkish citizens may have had personal information compromised by Russian hackers, according to a report.
The website for the Federal Election Commission (FEC), a government watchdog group that discloses campaign funding information, was adversely impacted for weeks.
The Denmark Financial Supervisory Authority announced on Tuesday that virtual currency is not covered by existing financial regulations.
In a court ruling, Judge Richard Leon of the Disctrict of Columbia wrote that the tactics used by the agency are "almost Orwellian" and infringe on the Fourth Amendment.
The National Cybersecurity and Critical Infrastructure Protection Act of 2013 was introduced Wednesday in a bipartisan effort by four lawmakers.
The NSA is taking advantage of the same technology used to gauge consumer behavior online, to bolster its surveillance of suspicious individuals.
Heavyweight software and social media firms, including Apple, Microsoft and Twitter, have joined in on the coalition.
Among 125 law enforcement agencies in 33 states, one in every four use the "tower dump" tactic, new reports reveal.
Roughly 2,000 Chicago Public Schools students who participated in a free vision examination program may have had personal information compromised.
Microsoft announced on Wednesday that it would be improving and expanding its security to protect customer data amid growing concerns of government surveillance.
The agency makes use of the sweeping surveillance practice employing a sophisticated tool called "co-traveler," which essentially tracks bystanders interacting with targets.
Adobe breach affects 38 million, UK man indicted for hack of U.S. Army network, NIST debuts new cyber security framework, and other news.
Phyllis Schneck takes a level-headed approach to how the DHS should address potential attacks against critical infrastructure.
A group of prominent security professionals forecast the significant industry shifts in 2014. Greg Masters compiles the responses.
Like no other year before it, 2013 illustrated for the entire globe just how essential cyber security is to business endurance, economic durability and personal rights to privacy.
In addition to internet service providers (ISPs) making use of real-time response capabilities, a cyber security report suggested several other steps to stave off threats to the nation.
The National Security Agency is said to have infected more than 50,000 computer networks worldwide with malware that steals information.
Security spending will grow 10 fold in the next decade, a chief research analyst predicts, providing needed investments to address growing surveillance concerns.
The troublesome CryptoLocker malware has claimed another victim: a Massachusetts police department.
Yahoo announced that it never gave out user information to government agencies and that data moving between its centers will be encrypted.
According to an FBI memo obtained by Reuters, hackers exploited vulnerable Adobe software to infiltrate organizations' networks.
For the first time, the Obama administration has publicly addressed security threats to healthcare.gov, including a denial-of-service attack.
The number of times Google has complied with those demands has decreased.