Menu

fbi - News, Features, and Slideshows

News

  • FBI faces lawsuit because it's stayed mum on iPhone 5c hack

    The FBI’s refusal to reveal how it accessed an iPhone 5c from the San Bernardino shooter will face scrutiny in court. USA Today’s parent company and two other news group have filed a lawsuit against the agency, demanding it turn over the details.

    Written by Michael Kan17 Sept. 16 03:02
  • Even the FBI is worried about Internet of Things security

    Amidst all the excitement about the possible benefits of the Internet of Things, a slew of warnings have been sounded by IT pros, vendors and analysts about looming security threats. Now you can add the FBI to that list of those cautioning enthusiasts.

    Written by Bob Brown11 Sept. 15 20:53
  • 7 things to do when your business is hacked

    The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the carefully constructed defenses.

    Written by Tim Greene22 June 15 20:29
  • iPhone 7 rumour rollup: Heavy metal! Fingerprints! A kinda-sorta-maybe release date!

    Would you believe there are people so interested in Apple and all of its works that they want to know what's going on with the next generation of the iPhone <em>before it even comes out</em>? My editors assure me that this is the case. So, despite the obvious lunacy of the idea I mean, surely it's enough to know that there will probably be another one coming out at some point, right? I am stepping in to provide you with the latest scuttlebutt on what may or may not be the iPhone 7.

    Written by Jon Gold22 June 15 08:13
  • Prepare carefully before moving to the cloud

    Most companies are moving applications and systems to the cloud. But despite the attractions of this ever growing infrastructure model, the legal risks are neither widely nor well understood.

    Written by Guy Betar18 June 15 13:28
  • Social engineering disabling targets: Mitnick

    Many cyber criminals are using social engineering to get a foot in the door and gain access to corporate and government systems, says the world’s most famous hacker, Kevin Mitnick.

    Written by Byron Connolly05 May 15 14:51
  • Sony hackers targeted employees with fake Apple ID emails

    Hackers probably gained access to Sony's network last year after a series of phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs, a security expert said today.

    Written by Gregg Keizer24 April 15 04:47
  • A true story of combating a large-scale DDoS attack

    Real tales of cyberattack response and recovery are hard to come by because organizations are reluctant to share details for a host of legitimate reasons, not the least of which is the potential for negative financial fallout. However, if we never tell our stories we doom others to blindly walk our path. Better to share our real-world battlefield experiences and become contributors to improved threat intelligence.

    Written by By Adrian Newby, CTO, CrownPeak15 April 15 05:32
  • Lessons to be learned from a project nightmare

    The U.S. Department of Labor (DOL) is in the middle of an Oracle Financials implementation that has gone horribly wrong. Its experience should serve as a cautionary lesson for enterprises planning major projects.

    Written by Bart Perkins12 March 15 02:33
  • What happens inside Amazon when there's a Xen vulnerability

    Amazon Web Services last year was estimated by Gartner to be five times bigger than its next 14 competitors combined. That's a lot of virtual machines. And they all run on a customized version of the open source Xen hypervisor, so when the Xen code has a security vulnerability, that's a big deal for AWS.

    Written by Brandon Butler04 March 15 05:25
  • Sen. Nelson questions use of StingRays for phone surveillance

    A U.S. Senator is questioning why the Federal Communications Commission (FCC) approved of a controversial cell phone surveillance device that both federal and state law enforcement agencies are using to track suspects, often without court orders to do so.

    Written by Lucas Mearian26 Feb. 15 09:39
Computerworld
ARN
Techworld
CMO