Senate Considers Using Mob Law To Go After Cybercriminals
Collaborators: Brian Donohue Paul Roberts Members of the Senate Judiciary Committee listened as one of the nation's top cyber cops asked for expanded powers to go after cybercriminal groups,...
View ArticleHouse GOP Task Force Favors Private Incentives, Fewer Regulations for...
A House GOP task force called on Congress this week to adopt voluntary incentives - rather than federal requirements - to get private companies to further develop their cyber security. read more
View ArticleStealing Corporate Data Doesn’t Violate Federal Computer Fraud Law
In a ruling that could be felt throughout the business world, the U.S. Court of Appeals for the Ninth Circuit in California ruled that a man did not violate the Computer Fraud and Abuse Act (CFAA)...
View ArticleCFAA Loopholes and Gotchas Discussed at Black Hat
The Computer Fraud and Abuse Act (CFAA) can be unsettling even to the most stalwart security researcher. The law, enacted in 1986 and revisited several times since, is still littered with loopholes and...
View ArticleLegal Divide Between Security Research and Cybercrime Remains Murky
The line between criminal hacking and well-meaning security research is a thin, hazy one according to a panel discussion at Black Hat.
View ArticleProposed CFAA Amendments Could Chill Security Research
Vague language in the White House's proposed amendments to the CFAA leave the door open to a chilling effect on legitimate security research.
View ArticleThreatpost News Wrap, January 16, 2015
Dennis Fisher and Mike Mimoso discuss the security news of the past week, including the proposed changes to the CFAA, David Cameron's encryption comments, the NSA's quasi-apology regarding Dual EC and...
View ArticleResearcher Tries to Get Ahead of CFAA Changes, Dumps 10M Sanitized Passwords
A dump of 10 million sanitized usernames and passwords was released online, sparking debate over its legality in light of proposed changes to the Computer Fraud and Abuse Act.
View ArticleSecurity Researchers Wary of Proposed Wassenaar Rules
The Commerce Department’s Bureau of Industry and Security today made public its proposal to implement the controversial Wassenaar Arrangement.
View ArticleSamy Kamkar’s ProxyGambit Picks Up for Defunct ProxyHam
Hardware hacker Samy Kamkar has developed an anonymization device called ProxyGambit that improves upon ProxyHam, the device that was supposed to be unveiled at DEF CON.
View ArticleEx-Cardinals Exec Sentenced Four Years for Astros Hack
A U.S. Federal Court sentenced Christopher Correa to almost four years in prison for hacking into a computer system that belongs to the Houston Astros.
View ArticleMirai Vulnerability Disclosed, But Exploits May Constitute Hacking Back
A buffer overflow found in the Mirai botnet could eliminate its ability to carry out HTTP flood attacks. But exploiting that vulnerability puts defenders in a gray area with regard to hacking back.
View ArticleRevised Active Defense Bill Allows Victims to Recover or Destroy Stolen Data
Rep. Tom Graves has revised a draft of the Active Cyber Defense Certainty Act with new provisions that include mandatory notification and permission to recovery or destroy stolen data on the attacker’s...
View ArticleMarcus Hutchins’ Only Certainty is Uncertainty
WannaCry hero Marcus Hutchins pleaded not guilty last week could be freed today on $30,000 bond before the case moves to Wisconsin.
View Article
More Pages to Explore .....