The legal implications of botnet disruptions

The best defense against a botnet is to get rid of it – to infiltrate it, to learn all about it, and to take it down. While the takedown is usually done by or with law enforcement and any necessary court orders, the initial infiltration, often by indiv…

Read More >>

Proof-of-concept malware takes over USB smartcards

As if malware weren’t becoming pervasive already, a new proof-of-concept has been developed by a team of researchers that takes over smart cards plugged into an infected computer’s USB port, putting them and all of the information contained on them in …

Read More >>

NASA laptop with unencrypted data stolen from vehicle

“On October 31, 2012, a NASA laptop and official NASA documents issued to a Headquarters employee were stolen from the employee’s locked vehicle,” says a 13 November email to all NASA employees. It warns that the laptop contains unencrypted personally …

Read More >>

Online fraud rings on the rise; 10K in US alone

While global cybersecurity attention tends to be placed on headline-grabbing exploits by hacktivists and cyber-espionage activities, there is a much less high-profile but no less dangerous threat festering: Online fraud rings, bent on identity theft.

Read More >>