Celebrity hacker Guccifer's confession gives us all a lesson in security
He pleaded guilty to unauthorized access to a protected computer and aggravated identity theft
Lucian Constantin | 01 Jun | Read more
He pleaded guilty to unauthorized access to a protected computer and aggravated identity theft
Lucian Constantin | 01 Jun | Read more
Security experts are divided about last week's decision by the U.S. Department of Justice to use Box for cloud-based document storage and collaboration.
Maria Korolov | 02 Jun | Read more
Data protection and mass surveillance are high on the agenda for talks between members of the European Parliament (MEPs) and their U.S. counterparts in Washington, D.C., this week.
Loek Essers | 17 Mar | Read more
Several recent court decisions have reinforced the principle that government agents may examine laptops, cellphones and other electronic devices in the possession of people crossing the border into the U.S.--even when there is no suspicion of wrongdoing.
Lee Dunst and Rachel Brook | 31 Oct | Read more
A status update filed in Pennsylvania by the U.S. Department of Justice said that both the Gameover Zeus botnet and Cryptolocker 'remained neutralized.'
Gregg Keizer | 15 Jul | Read more
A Chinese businessman used the cover of his aviation firm to steal data on US military aircraft programmes which was then hawked around companies in his home country, the US Department of Justice has alleged.
John E Dunn | 15 Jul | Read more
The US Department of Justice said 10 people were indicted today for their roles in a $20 million stolen identity refund fraud conspiracy.
Michael Cooney | 23 May | Read more
The U.S. Department of Justice, working with the FBI, this week took the unprecedented step of indicting five Chinese army officers for allegedly breaking into the networks of American companies and a labor union to steal trade secrets of use to Chinese businesses.
Ellen Messmer | 22 May | Read more
Sen. Dianne Feinstein's (D-Calif.) claim that the CIA violated provisions of the Computer Fraud and Abuse Act when it accessed computers used by members of the Senate Intelligence Committee, could be hard to substantiate, according to a leading legal expert.
Jaikumar Vijayan | 13 Mar | Read more
Prisons around the world this year made way for techie criminals alongside the more garden variety murderers, thieves and schemers.
Bob Brown and IDG News Service | 16 Dec | Read more
Latvia's Foreign Affairs Minister has expressed unhappiness at US attempts to extradite the alleged co-creator of the Gozi data-stealing Trojan, citing the disproportionate severity of sentence he might receive if found guilty.
John E Dunn | 06 Aug | Read more
Mounting backlash against National Security Agency spying practices is now coming from sources as varied as security expert Bruce Schneier, former Reagan-era budget director David Stockman and high-level representatives of European countries.
Ellen Messmer | 19 Jun | Read more
Strongbox preserves anonymity at the price of authenticty
John P. Mello | 21 May | Read more
A special court established to review government requests for warrants to conduct electronic surveillance of suspected foreign spies received close to 1,900 warrant requests last year -- all of which it approved.
Jaikumar Vijayan | 03 May | Read more
New federal restrictions now preclude four U.S. agencies from buying information-technology (IT) systems from manufacturers "owned, directed or subsidized by the People's Republic of China" due to national-security concerns. But is this a smart tactic?
Ellen Messmer | 03 Apr | Read more