iOS app Android app

Cyber Crime

Social Engineering: 9 Ways to Keep Your Identity Safe

Adrian Nazari | Posted 12.11.2014 | Money
Adrian Nazari

If you're feeling a little paranoid about identity theft, your concerns are justified. You're not being paranoid; these threats are real. Oftentimes, in fact more frequently than you might guess, thieves get through by social engineering.

Worrying About Cyber Warfare on Cyber Monday

John A. Tures | Posted 12.01.2014 | Politics
John A. Tures

As most Americans log on after a long holiday weekend from work, they are eager for all kinds of sales and savings. They probably aren't thinking about cyberterrorists, rogue states, and great powers eager to take the U.S.A. down a peg or two. But maybe they should.

Finding a Cure for Medical Identity Theft

Joe Ross | Posted 11.14.2014 | Money
Joe Ross

As we head into the final stretch of 2014, large-scale financial and retail breaches are top-of-mind for many of us, especially as we get ready for holiday shopping. But here is another type of identity theft that all consumers should be aware of and begin to monitor for -- medical identity theft.

Payments 101: How to Make Shopping More Secure

Joe Ross | Posted 10.15.2014 | Technology
Joe Ross

There's a movement happening in the payments world. With so many retailer data breaches in the past year, consumers, financial institutions, retailers and security professionals are wondering, plain and simple: how can we make shopping more secure?

My Secret: I Was One of Those Girls Who Had Sex With Older Men on the Internet

Erin McKelle | Posted 10.07.2014 | Women
Erin McKelle

Yes, there was something wrong, but it wasn't with me, and my cyber sex was nothing more than a symptom of something bigger. It was my way of showing that I felt out of control and helpless.

Cyber-Ransom and Online Extortion - 5 Ways You Could Fall Victim

Michael Gregg | Posted 09.01.2014 | Technology
Michael Gregg

Cyber-ransom is a relatively new crime on America's digital shores and it is spreading fast. While ransomware has actually been around for almost 10 years, it's mostly been limited to Russia and parts of Europe -- until now.

FBI Chief Warns Cyber Crime Is Posing An 'Enormous Challenge'

AP | ERIC TUCKER | Posted 05.21.2014 | Politics

WASHINGTON (AP) — Law enforcement faces an "enormous challenge" in preventing state-sponsored cyber crimes, FBI Director James Comey said Wednesday,...

FBI Director 'Grappling With The Question' Of How To Fix Hiring Policies Concerning Pot

The Huffington Post | Paige Lavender | Posted 05.21.2014 | Politics

James Comey, director of the Federal Bureau of Investigation, said Monday the agency is "grappling with the question" of how to amend its hiring polic...

Could Your Mother's Online Sharing Cost You Big Time?

Adam Levin | Posted 07.01.2014 | Technology
Adam Levin

While it can be a source of embarrassment when family stories go around the dinner table, the advent of social media makes that table very big, and surely, you don't know everyone who's been invited to dinner.

Internet Crimes

Jasmina Tesanovic | Posted 06.01.2014 | Technology
Jasmina Tesanovic

I don't believe Aaron Swartz ever wanted to become a martyr. He just wanted to live within a world that he believed he could fix, a world that was technically malleable and hackable, where he could be active and ingenious, even if that reform effort might involve a few false steps.

Training Future Cybercrime Fighters To Protect Your Thermostat

Cecily Joseph | Posted 04.07.2014 | Impact
Cecily Joseph

We need our next generation to not only think about data protection but how to manage the sharing of data, so we can continue to enjoy and embrace this connected world.

Teen Caught At Starbucks After 'Sexually Explicit' Messages To Child: Cops

Posted 02.04.2014 | Crime

A 19-year-old California man propositioned a 10-year-old girl with a lewd request on Facebook over the weekend, police say. Investigators intercept...

9 Questions for Santa Monica Chief of Police Jacqueline A. Seabrooks

Robert Gagnier | Posted 03.26.2014 | Los Angeles
Robert Gagnier

Chief Jacqueline Seabrooks is a 31-year law enforcement veteran with significant municipal policing experience. Under her leadership as Chief of Police in Inglewood, crime rates declined to levels not seen since the mid 1970s.

How to Handle Your Child's Social Media Disaster

Jason P. Stadtlander | Posted 10.21.2013 | Parents
Jason P. Stadtlander

What happens when your child has been abducted by a predator and you don't know who the predator is or where to look?

WATCH: Clear And Present Danger: Cyber-Crime, Cyber-Espionage, Cyber-Terror, And Cyber-War

Posted 07.19.2013 | Impact

This livestream is part of our coverage of the Aspen Security Forum. For more from the series, click here. DATE: July 18, 2013. TIME: 7:30p-8:30p E...

Andres Jauregui

'Virtual Lolita' Targets Cyberpredators

HuffingtonPost.com | Andres Jauregui | Posted 07.12.2013 | Technology

Spanish scientists have engineered a new tool in the cyberwar against sexual predators: a smart chat bot that uses game theory to engage, identify and...

Cyber Warfare: What Are the Rules?

Daniel Garrie | Posted 06.17.2013 | World
Daniel Garrie

With the advent of cyber warfare the complexity of what is war is even more clouded and the application of law to this is even murkier.

International Cyber Security at the UN: Between Doom and Hesitant Optimism

Lia Petridis Maiello | Posted 08.11.2013 | World
Lia Petridis Maiello

Clearly, establishing a worldwide regulatory framework for Internet security will require staying power, juridical skill and a strong belief in the need to protect both the integrity of vital Internet resources and the lives of those threatened by cyber insecurity.

Microsoft And FBI Team Up To Take Down $500 Million Cyber Crime Ring

Reuters | Jim Finkle | Posted 09.19.2014 | Technology

By Jim Finkle BOSTON (Reuters) - Microsoft Corp and the FBI, aided by authorities in more than 80 countries, have launched a major assa...

Federal Court Takes a Bite Out of Bitcoin

Mary Shannon Little | Posted 07.24.2013 | Business
Mary Shannon Little

The birth of the bitcoin was the ultimate open-source project controlled by a finite number of bitcoin platfoms capable of harnessing a virtually infinite amount of CPU processing power.

Popcorn Preview: Disconnect

Leslie Sisman | Posted 06.16.2013 | Entertainment
Leslie Sisman

Film: Disconnect (2012) Cast includes: Jason Bateman (Up in the Air), Hope Davis (The Weather Man), Frank Grillo (The Grey), Michael Nyqvist (The Girl...

It's Not Just The FBI Who Fight Cyber Criminals Anymore

AP | By EILEEN SULLIVAN | Posted 06.13.2013 | Technology

WASHINGTON (AP) — If a purse with $900 is stolen, the victim probably would call the police. If a computer hacker steals $900 from that same person'...

Training For 'The New Espionage'

AP | JAKE PEARSON | Posted 04.12.2013 | Technology

NEW YORK -- Every week, a group of teenagers and 20-somethings dressed in hoodies gets together in a tiny room on a college campus and plug in their l...

Cybertheft Threat Underscores Crucial Need to Protect American Intellectual Property

Chris Dodd | Posted 02.21.2013 | Technology
Chris Dodd

Front-page news this week that Chinese cyber hacking may have been sanctioned by the Chinese military has once again drawn significant attention to the critical need for the United States to step up the protection of its intellectual property.

Was Aaron Swartz a Victim of Prosecutorial Overkill?

Bennett L. Gershman | Posted 03.20.2013 | Crime
Bennett L. Gershman

In the end, the single most significant check on a prosecutor's discretion is not the judicial courts, nor the court of public opinion. The only realistic check lies in the integrity and professionalism of prosecutors.