In order to cause disruption within the stolen data markets of the dark web, its organizational structure must be analyzed, according to one expert at DefCon 22 in Las Vegas.
Apple schools law enforcement and government agencies in how to ask for data and says it will notify customers of the requests.
The social networking giant has filed a motion with a U.S. district judge, asking to throw out a recent suit that claims the company was hacking into its members' accounts.
Seeking legal advice before starting new projects that may violate the Computer Fraud and Abuse Act should be step one for security researchers, according to one legal expert.
As promised, documents have been filed to overturn the conviction and sentence of 27-year-old hacker Andrew "Weev" Auernheimer, who discovered a vulnerability in AT&T's public website and told Gawker about it.
For all of their bells and whistles, smartphones present real privacy concerns -- some of which users aren't aware.
A Chicago woman with roots in Nigeria was sentenced this week to 30 months in prison for playing a key role in extracting cash from the bank accounts of individuals whose prepaid payroll information was stolen in a massive 2008 breach.
The active pursuit of online criminals by authorities serves a valuable purpose, but often it ends up netting lesser fish and doesn't complete the entire equation of what is needed to battle today's slick adversaries.
The FBI-led takedown of Hong Kong-based P2P site MegaUpload -- and the arrests in New Zealand of its leaders -- was a big win for law enforcement. But pursuing suspects across borders can be tricky.
As the news settles that a trusted member of Anonymous was actually an FBI informant, some are wondering whether his FBI handlers went too far when trying to gather evidence about other suspected hackers.
Sabu, an Anonymous/LulzSec/AntiSec hacker beloved by many across the world, has spent the last nine months providing information to the FBI. What does this mean to the future of the hacktivist movement?
Security experts believe a member of Anonymous hacked into the email account of a law enforcement official, which provided them the credentials necessary to eavesdrop on an FBI-led conference call.
Recent prosecuted cases tackle long-running internet-based scams
More cyber crime rings will be broken up in 2012, but the risk/reward ratio for cyber crime will remain criminal friendly.
Digital media company Yahoo has ended a three-year legal battle against a team of spammers, winning a default judgment of $610 million.
The aftermath of a cyber crime takedown poses new challenges to law enforcement, like what to do about the victims' systems and data
Security professionals must establish relationships with their local FBI agents, and relevant information-sharing bodies, as well as have a plan of action before being hit with a breach.
A gang of Estonians is accused of infecting millions of computers, many in the United States, with DNS-changing trojans capable of manipulating the online advertising industry through clickjacking.
Researchers at Trend Micro say they have been hot on the tracks of a corporate hacker, and now they are turning over their findings to U.S. law enforcement.
More than half of Rustock-infected machines have been cleaned since Microsoft led a joint effort earlier this year to shut down the prolific botnet.
A Los Angeles man has earned considerable time behind bars after serving as the U.S. head of a phishing operation that stole more than $1 million from the customers of two banks.
The FBI, with the help of international partners, has broken up two criminal rings believed to be responsible for peddling scareware, federal prosecutors announced Wednesday.
Police believe they have apprehended a major cog in the LulzSec hacking collective's wheel, but the group said the suspect was, at best, a fringe associate.
Three members of the hacktivist collective Anonymous have been arrested in Spain, but the group has promised revenge to the country.
Police in Greece have arrested an 18-year old man suspected of hacking into computer systems belonging to the Pentagon, National Security Agency, FBI and Interpol, according to reports. The unnamed hacker, who used the alias "nsplitter," faces charges of hacking, fraud and illegal weapons possession. In addition to infiltrating government sites, the man also is reportedly accused of participating in credit card fraud. Greek police arrested the teen in his home in Athens on Monday. U.S. and French authorities aided in the investigation.
A bill recently introduced in the U.S. Senate would update a 25-year-old digital privacy law to require authorities to obtain a court-issued search warrant before retrieving a person's email and other content stored in the cloud.
Google and Apple are facing heat from U.S. and foreign lawmakers over the discovery that their smartphone and tablet devices are collecting and storing information about users' locations.
Anonymous location data being collected off smartphones is nothing new, but some privacy experts worry about the implication if law enforcement wants access to it.
Federal authorities have taken over the control hub of the prolific Coreflood botnet and filed a civil complaint against 13 unnamed defendants.
Famed hacker Albert Gonzalez says he should be released from prison because he was acting as an informant.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context