CYBERCRIME

Investors check out on bland Check Point outlook

IBTimes Logo
Internet and network security provider Check Point Software Technologies said it expected to meet second-quarter estimates, after reporting a rise in first-quarter net profit that beat forecasts on strong sales of its new products.
Chinese Hacking

U.S. And China Hold Secret Cyber War Games

Last year, representatives from the State Department and the Pentagon took part in two exercises with their Chinese counterparts where they had to describe what they would do if it emerged the other side was behind the release of a sophisticated computer virus damaging national assets.
More news
IBTimes Logo

Apple works on Mac malware fix but takes heat

The cybersecurity community raked Apple Inc over the coals on Wednesday, saying the company had dragged its heels on eradicating malware that experts say may have infected up to 600,000 Macintosh computers and can be used to ferret out sensitive user information.
IBTimes Logo

Global cyber arms race engulfing Web - Defense official

A global cyber arms race is engulfing the Internet and the best way to counter the rapidly escalating threat is combining the efforts of U.S. agencies, private firms and international allies, cyber security officials said on Tuesday.
IBTimes Logo

House to take up cybersecurity bill with revisions

The U.S. House of Representatives will take up a cybersecurity bill at the end of April that lets the government and corporations share information about hacking attacks on U.S. networks, with amendments intended to ease civil liberties concerns, lawmakers said on Tuesday.
A logo of Huawei Technologies Co. Ltd. is seen at the 13th China Hi-Tech Fair in Shenzhen

Symantec Cuts Ties With Huawei in Wake of Australian Cyber Security Concerns

Less than four years ago, American Internet security firm Symantec struck a deal with Chinese infrastructure equipment manufacturer Huawei Technologies, joining forces to develop computer network security products. However, in the wake of increasing cyber security concerns piling up against Huawei, Symantec decided to exit the venture, fearing that it would prevent it from gaining access to U.S. government classified information regarding cyber threats.
North Korean Leader Kim Jong-Un

Should US Worry About North Korea's Cyber Attack Capability?

The United States should worry more about North Korea's cyber attack capabilities than its nuclear arsenel, if the latest reports are any indication. A Bloomberg report has quoted General James Thurman, Commander of the United Nations Command and US Forces in Korea, as saying that Pyongyang has roped in hackers who possess cyber inflitration capabilities. North Korea employs sophisticated computer hackers trained to launch cyber infiltration and cyber attacks, Thurman was quoted as sa...
IBTimes Logo

Anonymous Hackers Helping Woman Save 4-Year-Old Girl From Alleged Sex Ring

An article published on pcmagazine.com on March 26 covered Anonymous's involvement in Lori Handrahan's efforts to save her daughter Mila, who she claims is being physically and sexually abused by her ex-husband Igor Malenko. The custody battle, which has been going for three years, may not be as clear-cut as Handrahan presents it.
IBTimes Logo

Microsoft seizes servers in Zeus cyberfraud

Microsoft Corp claimed a victory in efforts to combat online banking fraud, saying it had confiscated several servers used to steal login names and passwords, disrupting some of the world's most sophisticated cybercrime rings.
IBTimes Logo

Duqu Decoded: Was Trojan Built by 'Old School' Programmers?

With the help of programmers worldwide, Kaspersky researchers were finally able to identify the Duqu Trojan's mystery code. Part of the malware was created with a little used programming language, which prompts researchers to believe it may have been written by experienced, old-school programmers. The Duqu Trojan is an espionage tool that drew lots of attention last year because it has many Stuxnet-like features.
IBTimes Logo

Security experts will tip consumers to cyber fraud

Internet security experts have set up a system to alert Americans when sensitive personal information such as social security numbers and online banking log-in credentials turn up in the hands of cyber fraudsters.
A protester wearing a Guy Fawkes mask, symbolic of the hacktivist group ''Anonymous'', takes part in a protest in central Brussels January 28, 2012.

'Anonymous' Hurt by Arrests But Hard to Kill

In turning one of its best-known hackers into an informant and breaking open the highest profile elements of the "Anonymous" movement, authorities have dealt a serious blow to a group they found a growing irritant.
The main headquarters of the FBI, the J. Edgar Hoover Building, is seen in Washington

Hacking 'Mole' Helps FBI Arrest Anonymous Leaders

One of the world's most-wanted hackers secretly became an FBI informant last year, providing evidence that led to charges on Tuesday against five other suspected leaders of the Anonymous international hacking group.
IBTimes Logo

U.S. charges members of hacking group Anonymous

Six suspected leaders of the international hacking organization known as Anonymous were charged by U.S. authorities of computer crimes, dealing a major blow to the loose-knit group that has wreaked havoc on the websites of government agencies and major corporations.
Anonymous Hackers Attack Police Distributor Website

Anonymous Downplays Zeus Trojan Hacking as Symantec Reveals Own Supporters Duped

Anonymous has taken to Twitter to downplay the incident and to warn users after Symantec released a report claiming that anti-Anonymous hackers had duped the hactivist collective into adding Zeus Trojan malware to a guide for distributed denial-of-service (DDoS) attacks. Although some Anonymous-affiliated Twitter handles have warned users of the modified link, most have gone after Symantec for misrepresenting the threat.
IBTimes Logo

NASA says it was hacked 13 times last year

NASA said hackers broke into its computer systems 13 times last year, stealing employee credentials and gaining access to mission-critical projects in breaches that could compromise U.S. national security.

Pages

IBT Spotlight

We Help Businesses Find B2B Service Providers They Can Trust.