A hacker going by the name of ‘Bitcoin Baron’ has issued a threat to the city of Detroit after a Wayne County Circuit Court Judge dismissed a police manslaughter charge.
A 51 year old man is facing a lengthy prison sentence in the United Kingdom after admitting to a series of distributed denial of service attacks against social housing, social services and crime prevention websites.
Is America’s new Cyber Threat Intelligence Integration Center a step forward? Or a duplication of the National Cybersecurity and Communications Integration Center at DHS?
The White House is creating a new agency to help counter cyberthreats, analyzing intelligence from around the government so it is better equipped to deal with attacks.
A new cybersecurity video from the Australian Cyber Security Centre (ACSC) has taken an unusual approach to raising awareness, playing dumb in this mock public service announcement aimed at a “non-technical” audience.
Anthem Inc. has suffered an attack on its database which is likely to be the biggest data breach ever disclosed by a health insurance company.
Cybercrime was the focus of everyone’s attention at this year’s World Economic Forum in Davos.
Cybersecurity and cybercrime are a hot political topic in America these days, but a history of ignoring warning signs suggests a lack of commitment to acting on the rhetoric.
Presenting a recorded webinar that seeks to answer this question: How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves?
Are hacking victims “hacking back”? That question was recently posed in headlines like this one from Bloomberg: FBI Investigating Whether Companies Are Engaged in Revenge Hacking. The Marketplace reporter, Ben Johnson, speculated that 2015 might be the year of “hacking back” when he asked me about revenge hacking. As I told Ben, there are several good
Police are closing in on thieves who stole Bitcoin valued at $370 million during the collapse of popular exchange Mt Gox – and just 1% of the theft is believed to be the work of outside hackers.
Sony executives turned to old BlackBerries found in a basement in the firm’s California headquarters in, using SMS text messages and a ‘phone tree’ to communicate in the wake of the attack.
Tor has been used to mask the identities of cybercriminals in a significant number of bank frauds for over a decade, according to a US Treasury Department report obtained by Brian Krebs on his Krebs on Security website.