The United States secretly penetrated North Korea's computer systems four years ago -- a breach that allowed Washington to insist Pyongyang was to blame for the recent cyberattack on Sony Pictures, the New York Times reported Monday.
An 18-year-old was arrested this morning in the United Kingdom on suspicion of being involved in the distributed denial-of-service (DDoS) attacks launched against Sony PlayStation and Xbox Live over Christmas.
British prime minister David Cameron on Monday announced that if he’s re-elected in May, he plans on introducing a comprehensive piece of legislation that would ban encrypted online communications that cannot be accessed by authorities.
Increased Internet surveillance and tighter border checks are "urgently" needed to foil jihadist attacks of the sort that rocked Paris this week, European, US and Canadian security ministers agreed Sunday.
In late November, Sony Pictures Entertainment was hacked by a group calling itself Guardians of the Galaxy (GOP). What initially appeared to be another hacktivist attack, later turned out to be a sophisticated operation possibly orchestrated by a state actor.
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
Because transactions using virtual currencies happen anonymously, they confuse issues of jurisdiction and can become difficult to enforce. When authorities do take action, cybercrime simply re-images itself with a new currency and a new platform.
As the “Snowden leaks” continue in their revelations and unraveling of the twisted web of government surveillance, it is becoming clear that the foundation of trust in the Internet as a shared commons has been thoroughly undermined.
The power of metadata does not come in that data itself but in the ability of that data to be processed and correlated in an automated fashion. What many believe is meaningless data can reveal more than one would think.
Over the past year the buzz around tracking threat actors has been growing and in my opinion hitting the height of the hype cycle. Relying on behavior profiles alone is a great way to get an unwelcomed outcome.