New and subtle business models are emerging for cybercriminals, boosting their sales of stolen data and offering new ways to inflict damage on target organisations. Hackers are commercialising stolen data by selling it back to legitimate businesses, one security expert has warned.
Like a subgroup of the Internet of Things, connected toys are the new generation of children’s toys – often using Wi-Fi and an iOS or Android-based remote control to manage and manipulate a car, quadcopter, or Lego robot.
PALO ALTO, Calif. — In late 2013, an A.T.M. in Kiev started dispensing cash at seemingly random times of day. No one had put in a card or touched a button. Cameras showed that the piles of money had been swept up by customers who appeared lucky to be there at the right moment.
New research suggests more than 1 billion data records were stolen from more than 1,500 individual data breaches last year. The latest findings from Gemalto, an enterprise security firm, represent a significant year-over-year increase in both corporate breaches and data theft.
Facebook has launched ThreatExchange, a social network of sorts designed to allow companies to share information and intelligence about cyberthreats. The move is the latest example in how an age of cooperation may be emerging as companies increasingly battle cyberattacks of various stripes.
WASHINGTON (AP) — The computer files of more than 40,000 federal workers may have been compromised by a cyberattack at federal contractor KeyPoint Government Solutions, the second breach this year at a major firm handling national security background investigations of workers at federal agencies,
Verizon is the latest big company to enter the post-Snowden market for secure communication, and it’s doing so with an encryption standard that comes with a way for law enforcement to access ostensibly secure phone conversations.
Edward Snowden, left, appears with Glenn Greenwald in a scene from the documentary Citizenfour. (Radius TWC/AP …The FBI has identified an employee of a federal contracting firm suspected of being the so-called “second leaker” who turned over sensitive documents about the U.S.
SAN FRANCISCO — Bob Foreman’s architecture firm ran up a $166,000 phone bill in a single weekend last March. But neither Mr. Foreman nor anyone else at his seven-person company was in the office at the time. “I thought: ‘This is crazy. It must be a mistake,’ ” Mr. Foreman said.
NEW YORK — For the past two weeks, federal agencies and the executive branch have launched a cacophony of critique of Apple and Google for bolstering the encryption on their users’ smartphones.