Cyber Crime

Cyber Crime

The Obama administration is seeking to expand the investigatory powers given to the FBI and amend surveillance legislation to give the Bureau explicit authority...

The US Department of Defence (DoD) is bringing some foresight to the threat of information leakers and traitors. The DoD is building “a massive...

A  simple Web search can reveal information from thousands of unsecured devices. Even the casual browser can access camera data from Sweden, video game...

A vulnerability in cellular communication systems demonstrated in 2014 is still unpatched, allowing hackers to track your location, read your SMS messages, and record...

The FBI now has the powers to hack computers anywhere around the world, the Intercept reports. The US Supreme Court approved changes to regulations...

Hacktivist collective Anonymous have found a new target to wage cyber-war on: economic institutions. Anonymous have released a message warning of a series of...

Satellite expert Roger McKinley warns that “we've become overdependent” on GPS, in an interview with Vox. The former president of the Royal Institute of...

China’s twenty-five technology companies have pledged to counter online terror activities. Chinese search engine Baidu, Tencent investment holding company, Alibaba and JD.com - e-commerce companies,...

MadSec’s Cyber Intelligence team, which is investigating the cyber operation OpIsrael 2016 against Israel scheduled for April 7th, 2016, reports that the group of...

Over the last few years a new menace has emerged: ransomware. Hackers now routinely take control and hold hostage the computer systems of businesses,...

The explosion of technology in recent decades brought about with it a wealth of possibilities. Unfortunately, some of these possibilities are a boon for...

Despite repeated denials by the US government, a federal judge has now confirmed that Carnegie Mellon University (CMU) was commissioned by the government to...

A new French law would impose penalties and fines on smartphone manufacturers who refuse to hand over encrypted information to law enforcement in terrorism...

Most current password security systems for the Internet are flawed. And it goes beyond the systems themselves: Passwords really are just an awful way...

US can’t be successful in banning encryption as it is a global phenomenon, according to Harvard study. Despite over two years’ efforts by the...

A rogue hacker group managed to penetrate the US Department of Homeland Security (DHS) secure network and make off with a database containing the...

Last month, some of the world’s foremost experts on cybersecurity gathered in Lille, France for the International Forum on Cybersecurity, as well as politicians,...

A Department of Homeland Security firewall, meant to detect and prevent hacking attempts by nation-states against the US government, is apparently not very good...

AMX, a supplier of audio-visual and building control equipment among whose clients you’ll find the US Army and the White House, built in a...

The South Korean Police recently announced that it has opened an investigation into what appear to be fraudulent emails sent to S Korean officials....

A second high-ranking American intelligence official has had his personal accounts breached in roughly three months. The personal online accounts of James Clapper, director...

Researchers from the Centre for Security Communication and Network Research (CSCAN) at Plymouth University have developed a new system for secure, multi-level authentication that...