• IID raises $8 million to scale shared cyberintelligence offering

    Despite the growing danger posed by cybercrime, information vital to stemming the tide is fragmented across the Internet today. Pockets of data about threat activity are siloed within the repositories of individual enterprises, government organizations, vendor networks, and research institutions. IID’s ActiveTrust enables enterprises and government agencies to combat the rising frequency and sophistication of cyberattacks by sharing cyber incident data in real time. IID has raised $8 million in Series A funding from Bessemer Venture Partners (BVP), and said it will use the investment to accommodate growing demand for ActiveTrust.

  • Trustev closes $3 million seed funding round

    According to research by eMarketer, global e-commerce sales are expected to reach nearly $1.3 trillion in 2013, making online fraud prevention an urgent and important requirement for every merchant. Trustev addresses this requirement by using multiple dynamic data sources to independently verify a user’s identity on e-commerce sites. The company has just closed a $3 million seed funding round to finance the further development of its e-commerce security and online fraud protection technology.

  • U.S., China begin formal cybersecurity talks

    U.S. and Chinese officials have begun a week of formal discussions on cybersecurity. A bi-lateral group held its first meeting Monday at the State Department with both civilians and military officials included in the talks.

  • States eager to attract cybersecurity companies

    As the threat of cyberattacks grows, Maryland, Washington D.C., and Virginia want to cash in on the growing business of cybersecurity. Analysts say that several states are using tax breaks to get in on the $207 billion cybersecurity industry, which is expected to show “impressive growth” in the next five years.

  • Report: U.S. companies should consider counter-hacking Chinese hackers

    A group studying how the United States should respond to the sustained campaign of cyberattacks conducted by Chinese government hackers against U.S. companies, said the United States should seriously consider a campaign of retaliatory cyberattacks against the hackers.

  • Criminals may use new channels to trigger mobile malware

    Researchers have uncovered new hard-to-detect methods that criminals may use to trigger mobile device malware that could eventually lead to targeted attacks launched by a large number of infected mobile devices in the same geographical area. Such attacks could be triggered by music, lighting or vibration.

  • House panel approves CISPA, angering privacy advocates

    The U.S. House Intelligence Committee passed a cybersecurity measure by an overwhelming vote, a measure which privacy advocates dislike because, they argue, it does not protect the personal information of citizens.

  • DHS, international tech-crime investigative body, partners on cybersecurity

    The High Technology Crime Investigation Association (HTCIA) said it would team up with DHS Stop. Think. Connect. Campaign’s National Network. The partnership will promote awareness of cyber security to industry, university, and government organizations nationwide.

  • Sponsors of CISPA to address nagging privacy concerns about the bill

    House Intelligence Committee chairman Mike Rogers (R-Michigan) and Ranking Member Dutch Ruppersberger (D-Maryland), sponsors of the Cyber Information Sharing and Protection Act (CISPA), say they are currently working on the draft to alleviate privacy concerns civil liberty advocates may have about the bill.

  • Cat Killer Sean Lynde MacKenzie moves to Cyber-Extortion, Cyber-Harassment

    Sean Lynde, who pled guilty in New York to criminal animal cruelty and cyber extortion, has now assumed the name “MacKenzie” and is expanding his cyber extortion activities. According to charges filed before the New York Supreme Court, Lynde is now purchasing Web site accounts using other people’s names, posting death threats and defamatory statements on these sites, and then trying to extort funds from the targets. Holding multiple drivers licenses, in multiple names, Lynde reflects how criminals increasingly use the Web to cyber extort businesses and individuals

  • Cat Killer Sean Lynde MacKenzie moves to Cyber-Extortion, Cyber-Harassment

    Sean Lynde, who pled guilty in New York to criminal animal cruelty and cyber extortion, has now assumed the name “MacKenzie” and is expanding his cyber extortion activities. According to charges filed before the New York Supreme Court, Lynde is now purchasing Web site accounts using other people’s names, posting death threats and defamatory statements on these sites, and then trying to extort funds from the targets. Holding multiple drivers licenses, in multiple names, Lynde reflects how criminals increasingly use the Web to cyber extort businesses and individuals

  • South Carolina exploring different cybersecurity plans

    Last month state officials in South Carolina discovered a massive breach at the Department of Revenue; the attack exposed 3.6 million social security numbers of residents in the state, 387,000 credit and debit card numbers, and information for 657,000 businesses as well as other personal information; now, officials are trying to figure out what security measures they need to take in order to prevent another attack

  • ICE, federal agencies train computer forensic investigators

    For the past fourteen years, U.S. Immigration and Customs Enforcement (ICE) has been responsible for training ICE officers and special agents to become computer forensic investigators; ICE teaches the class in conjunction with the U.S. Secret Service and the Internal Revenue Service

  • Wynyard Group takes New Zealand Police forensics solution global

    Developed in 2007, New Zealand Police technology called EVE (Environment for Virtualized Evidence) allows enforcement officers rapidly to analyze seized electronic goods such as mobile phones, PCs, and other storage devices for evidence and intelligence

  • FTC charges businesses exposed sensitive information on P2P file-sharing networks

    The U.S. Federal Trade Commission (FTC) has charged two businesses with illegally exposing the sensitive personal information of thousands of consumers by allowing peer to peer file-sharing software to be installed on their corporate computer systems