Law Enforcement News, Articles and Updates
On the heels of reports that the White House was swaying toward supporting encryption and strongly disavowing legislation that would force companies to unlock customer smartphones and apps when presented with a court order, a working group in the Obama administration had mulled ways that encrypted communications could be unlocked.
Despite the concerns expressed by the intelligence community and law enforcement agencies, President Obama is being urged by several agencies to support encryption.
In a Wednesday blog post the FTC explained the process it follows to investigate security breaches and said it looks favorably on companies that cooperate in law enforcement investigations.
A police department in Wenzhou bought a coding machine and software used to plant trojans in jail-broken iPhones and Androids.
In order to cause disruption within the stolen data markets of the dark web, its organizational structure must be analyzed, according to one expert at DefCon 22 in Las Vegas.
Apple schools law enforcement and government agencies in how to ask for data and says it will notify customers of the requests.
The social networking giant has filed a motion with a U.S. district judge, asking to throw out a recent suit that claims the company was hacking into its members' accounts.
Seeking legal advice before starting new projects that may violate the Computer Fraud and Abuse Act should be step one for security researchers, according to one legal expert.
As promised, documents have been filed to overturn the conviction and sentence of 27-year-old hacker Andrew "Weev" Auernheimer, who discovered a vulnerability in AT&T's public website and told Gawker about it.
For all of their bells and whistles, smartphones present real privacy concerns -- some of which users aren't aware.
A Chicago woman with roots in Nigeria was sentenced this week to 30 months in prison for playing a key role in extracting cash from the bank accounts of individuals whose prepaid payroll information was stolen in a massive 2008 breach.
The active pursuit of online criminals by authorities serves a valuable purpose, but often it ends up netting lesser fish and doesn't complete the entire equation of what is needed to battle today's slick adversaries.
The FBI-led takedown of Hong Kong-based P2P site MegaUpload -- and the arrests in New Zealand of its leaders -- was a big win for law enforcement. But pursuing suspects across borders can be tricky.
As the news settles that a trusted member of Anonymous was actually an FBI informant, some are wondering whether his FBI handlers went too far when trying to gather evidence about other suspected hackers.
Sabu, an Anonymous/LulzSec/AntiSec hacker beloved by many across the world, has spent the last nine months providing information to the FBI. What does this mean to the future of the hacktivist movement?
Security experts believe a member of Anonymous hacked into the email account of a law enforcement official, which provided them the credentials necessary to eavesdrop on an FBI-led conference call.
Recent prosecuted cases tackle long-running internet-based scams
More cyber crime rings will be broken up in 2012, but the risk/reward ratio for cyber crime will remain criminal friendly.
Digital media company Yahoo has ended a three-year legal battle against a team of spammers, winning a default judgment of $610 million.
The aftermath of a cyber crime takedown poses new challenges to law enforcement, like what to do about the victims' systems and data
Security professionals must establish relationships with their local FBI agents, and relevant information-sharing bodies, as well as have a plan of action before being hit with a breach.
A gang of Estonians is accused of infecting millions of computers, many in the United States, with DNS-changing trojans capable of manipulating the online advertising industry through clickjacking.
Researchers at Trend Micro say they have been hot on the tracks of a corporate hacker, and now they are turning over their findings to U.S. law enforcement.
More than half of Rustock-infected machines have been cleaned since Microsoft led a joint effort earlier this year to shut down the prolific botnet.
A Los Angeles man has earned considerable time behind bars after serving as the U.S. head of a phishing operation that stole more than $1 million from the customers of two banks.
The FBI, with the help of international partners, has broken up two criminal rings believed to be responsible for peddling scareware, federal prosecutors announced Wednesday.
Police believe they have apprehended a major cog in the LulzSec hacking collective's wheel, but the group said the suspect was, at best, a fringe associate.
Three members of the hacktivist collective Anonymous have been arrested in Spain, but the group has promised revenge to the country.
Police in Greece have arrested an 18-year old man suspected of hacking into computer systems belonging to the Pentagon, National Security Agency, FBI and Interpol, according to reports. The unnamed hacker, who used the alias "nsplitter," faces charges of hacking, fraud and illegal weapons possession. In addition to infiltrating government sites, the man also is reportedly accused of participating in credit card fraud. Greek police arrested the teen in his home in Athens on Monday. U.S. and French authorities aided in the investigation.
A bill recently introduced in the U.S. Senate would update a 25-year-old digital privacy law to require authorities to obtain a court-issued search warrant before retrieving a person's email and other content stored in the cloud.
SC Magazine Articles
- USAA members hit with multiple phishing attacks
- Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak
- Trust exercise: Symantec's new website security expert is reaching out to hacker community
- Three zero-days found in iOS, Apple suggests users update their iPhone
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Don't connect your charging cell to a computer or you may get hacked!