Bookmark & Share Subscribe to Feed
filters The site consists of a variety of newsfeeds. While this content is not unique, the collection of stories changes daily. While those with the capacity and willingness to see patterns will surely learn from the content on this site, we filter information constantly. This is important on many levels, but the media, politicians, and our personal ideology and values also come to play. While "cyberlaw" may not be a particularly controversial topic, note the way this crime is being defined and to whom various labels apply.

Cyber Law News

Cyber Crime News

Cyber Security News

Stanford Center for the Internet and Society

Cyber Crime

Cyber Terror

US-CERT

  • newSB19-077: Vulnerability Summary for the Week of March 11, 2019
    Original release date: March 18, 2019The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the…
    - 6 hours ago, 18 Mar 19, 1:07pm -
  • New Zealand Tragedy-Related Scams and Malware Campaigns
    Original release date: March 15, 2019 | Last revised: March 18, 2019In the wake of the recent New Zealand mosque shootings, the Cybersecurity and Infrastructure Security Agency (CISA) advises users to watch out for possible malicious cyber activ…
    - 3 days ago, 15 Mar 19, 10:18pm -
  • Intel Releases Security Advisories on Multiple Products
    Original release date: March 15, 2019Intel has released security updates and recommendations to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.The Cyber…
    - 3 days ago, 15 Mar 19, 4:28pm -
  • VMware Releases Security Updates for Workstation and Horizon
    Original release date: March 15, 2019VMware has released security updates to address vulnerabilities affecting Workstation 14 and 15, and Horizon 6 and 7. An attacker could exploit some of these vulnerabilities to take control of an affected sys…
    - 3 days ago, 15 Mar 19, 3:38pm -
  • Microsoft Releases Security Update for Azure Linux Guest Agent
    Original release date: March 14, 2019Microsoft has released an update to address a vulnerability in Azure Linux Guest Agent. An attacker could exploit this vulnerability to obtain access to sensitive information.The Cybersecurity and Infrastruct…
    - 4 days ago, 15 Mar 19, 1:42am -
  • MS-ISAC Releases Security Primer on TrickBot Malware
    Original release date: March 14, 2019The Multi-State Information Sharing and Analysis Center (MS-ISAC) has released a security primer on TrickBot malware. TrickBot is a modular banking Trojan that targets users’ financial information and acts…
    - 4 days ago, 14 Mar 19, 8:33pm -
  • WordPress Releases Security Update
    Original release date: March 14, 2019WordPress 5.1 and prior versions are affected by a vulnerability. An attacker could exploit this vulnerability to take control of an affected website.The Cybersecurity and Infrastructure Security Agency (CISA…
    - 4 days ago, 14 Mar 19, 2:15pm -
  • Cisco Releases Security Updates
    Original release date: March 13, 2019Cisco has released security updates to address vulnerabilities in Cisco products. A remote attacker could exploit one of these vulnerabilities to cause a denial-of-service condition.The Cybersecurity and Inf…
    - 5 days ago, 13 Mar 19, 8:39pm -
  • Google Releases Security Updates for Chrome
    Original release date: March 13, 2019Google has released Chrome version 73.0.3683.75 for Windows, Mac, and Linux. This version addresses multiple vulnerabilities that an attacker could exploit to take control of an affected system. The Cybersec…
    - 5 days ago, 13 Mar 19, 8:28pm -
  • Microsoft Releases March 2019 Security Updates
    Original release date: March 12, 2019Microsoft has released updates to address multiple vulnerabilities in Microsoft software. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.The Cybersecurity…
    - 6 days ago, 12 Mar 19, 7:02pm -

FBI Cyber Crimes Stories

  • Addressing the Cyber Threat
    At the RSA Conference in San Francisco, Director Christopher Wray discussed the FBI’s approach to combating cybercrime through expertise, technology, and partnerships.
    - 12 days ago, 6 Mar 19, 3:24pm -
  • Ransomware Abettor Sentenced
    A man who profited from the ransomware known as Reveton, which appropriated the FBI logo to scare victims into paying to unlock computers infected with the malware, will be spending time in prison.
    - 6 Dec 18, 2:14pm -
  • Ransomware Suspects Indicted
    Two Iranian men were indicted in connection with the deployment of the sophisticated and sinister SamSam ransomware that crippled the operations of critical facilities in the U.S. and Canada.
    - 28 Nov 18, 9:02am -
  • The Morris Worm
    Thirty years ago, a graduate student unleashed the first major attack on the Internet and became the first person convicted of a new type of crime.
    - 2 Nov 18, 3:28pm -
  • Cyberstalking
    Two unrelated sextortion crimes committed months apart and hundreds of miles away from each other illustrate the dangers of compromising personal photos being in the wrong hands.
    - 30 Oct 18, 10:18am -
  • Russian Hackers Indicted
    Seven GRU military intelligence officers have been charged with hacking into the computer networks of U.S. and international organizations, including those cracking down on Russia’s state-sponsored doping activities.
    - 4 Oct 18, 12:06pm -
  • National Cybersecurity Awareness Month
    Cybersecurity is everyone’s responsibility, and this month serves as a reminder that each of us has a part to play in making the Internet safer and more secure.
    - 1 Oct 18, 10:49am -
  • Safe Online Surfing
    The FBI’s Safe Online Surfing (SOS) Internet Challenge, designed for third- through eighth-grade students, has opened for the 2018-19 school year and is now available in Spanish.
    - 7 Sep 18, 10:12am -
  • Malware Creator Sentenced
    The developer of a malicious piece of software called NanoCore RAT—which allowed hackers to steal sensitive information and even access the webcams of infected computers—will be spending time behind bars.
    - 5 Jul 18, 9:00am -
  • International BEC Takedown
    The FBI partnered with domestic and international law enforcement agencies on Operation WireWire, a large-scale, coordinated effort to dismantle business e-mail compromise schemes.
    - 11 Jun 18, 9:00am -
  • Stolen Identities
    Four men who hacked the computer servers of mortgage brokers used the personal information they stole from customers to open unauthorized lines of credit and drain victims’ retirement accounts.
    - 29 Mar 18, 2:50pm -
  • Director Addresses Cyber Conference
    At the International Conference on Cyber Security in New York, FBI Director Christopher Wray discussed how the FBI is evolving to stay ahead of threats in the digital age.
    - 11 Jan 18, 3:33pm -
  • Cyber Security: Our Shared Responsibility
    Each October, the FBI joins its partners in reminding everyone to do their part to protect themselves in an increasingly Internet-connected world.
    - 2 Oct 17, 9:00am -
  • Safe Online Surfing
    The FBI’s Safe Online Surfing (SOS) Internet Challenge—a free, educational program for children that teaches cyber safety—has been updated and redesigned for the 2017-2018 school year.
    - 12 Sep 17, 12:00pm -
  • AlphaBay Takedown
    U.S. and international law enforcement officials announced the takedown of the Darknet marketplace AlphaBay, where criminals anonymously bought and sold drugs, weapons, and other illicit goods.
    - 20 Jul 17, 12:22pm -

Security and Privacy

  • How to quickly manage and delete your Google search history
    We already know Google collects a ton of data on us, and a lot of it comes from search. Google offers plenty of ways to limit the amount of data you have lying around, but they’re not all that easy to find. Starting today, Google is making it ea…
    - 24 Oct 18, 3:04pm -
  • F-Secure Freedome review: A VPN with some built-in antivirus features
    F-Secure Freedome in brief:P2P allowed: NoBusiness location: FinlandNumber of servers:  N/ANumber of country locations: 22Cost: $50-$80 per yearVPN protocol: OpenVPNData encryption: AES 128-bitData authentication: AES 128-bitHandshake…
    - 27 Sep 18, 10:30am -
  • F-Secure Freedome review: A VPN with some built-in antivirus features
    F-Secure Freedome in brief:P2P allowed: NoBusiness location: FinlandNumber of servers:  N/ANumber of country locations: 22Cost: $50-$80 per yearVPN protocol: OpenVPNData encryption: AES 128-bitData authentication: AES 128-bitHandshake…
    - 27 Sep 18, 10:30am -
  • Google promises a fix for Chrome's auto account-sign-in snafu, but you can stop it right now
    Google’s Chrome 69 hides a disturbing twist: if you log into Gmail or another Google service, Chrome seems to automatically log you into the browser as well. Theoretically, that means that you will automatically begin sharing data with Google, l…
    - 26 Sep 18, 12:38pm -
  • ProtonVPN review: Underground data centers, one-click multi-hop, and more make for a great choice
    ProtonVPN in brief:P2P allowed: Yes, on specified serversBusiness location: SwitzerlandNumber of servers: 249Number of country locations: 19Cost: Free, $48, $96, or $288 per yearVPN protocol (default): OpenVPNData encryption: AES-256Data a…
    - 4 Sep 18, 12:00pm -
  • Perfect Privacy review: The price is high, but the speeds are good
    Perfect Privacy in brief:P2P allowed: YesBusiness location: Sweden, Panama, and LatviaNumber of servers: 54Number of country locations: 23Cost: €119.99 (about $138 at this writing)VPN protocol: OpenVPNData encryption: AES-256-CBCData a…
    - 27 Aug 18, 12:00pm -
  • Perfect Privacy review: The price is high, but the speeds are good
    Perfect Privacy in brief:P2P allowed: YesBusiness location: Sweden, Panama, and LatviaNumber of servers: 54Number of country locations: 23Cost: €119.99 (about $138 at this writing)VPN protocol: OpenVPNData encryption: AES-256-CBCData a…
    - 27 Aug 18, 12:00pm -
  • Google Privacy Checkup FAQ: How to limit tracking and still use the apps you love
    It's been a rough month for Google. A new report by Digital Content Next reveals some troubling news: Android phones, even when idle, send data to Google at an alarming pace. In fact the study found that an Android phone "communicated location inf…
    - 22 Aug 18, 3:38pm -
  • OVPN review: An ideal VPN except for one big drawback
    OVPN in brief:P2P allowed: Yes Business location: Stockholm, Sweden Number of servers: 56 Number of country locations: 7 Cost: $84 per year VPN protocol: OpenVPN Data encryption: AES-256-GCM Data authentication: SHA1 HMAC Handshake encryption: TL…
    - 26 Jul 18, 1:00pm -
  • PrivateVPN review: It's fast and flexible
    P2P allowed: YesBusiness location: SwedenNumber of servers: 100+Number of country locations: 55Cost: $50 per yearVPN protocol: OpenVPNData encryption: AES-128-GCM (server-side negotiation can improve to AES-256)Data authentication: S…
    - 29 May 18, 10:00am -
  • ZenMate VPN review: This simple VPN clears your mind of complexity
    ZenMate VPN in brief:P2P allowed: YesBusiness location: Berlin, GermanyNumber of servers: 300+Number of country locations: 29Cost: $60 per yearVPN protocol: IPSec + L2TPData encryption: 2048-bit PSK/ESP Data authentication: AES 256/HMA…
    - 13 Apr 18, 11:00am -
  • ibVPN review: A no-frills VPN with everything you need
    ibVPN in brief:P2P allowed: YesBusiness location: Târgu Mureș,RomaniaNumber of servers: 180+Number of country locations: 50Cost: $37 (Standard) / $58 (Ultimate)VPN protocol: IPSec (default)Data encryption: AES-256 Data authenticat…
    - 12 Apr 18, 10:00am -
  • WiTopia personalVPN review: It's all about choices
    WiTopia personalVPN in brief:P2P allowed: YesBusiness location: Reston, VANumber of servers: 300+Number of country locations: 45Cost: $50 (Basic) / $70 (Pro)VPN protocol: OpenVPN (default)Data encryption: AES-128 Data authentication: SHA2…
    - 22 Mar 18, 10:00am -
  • Is your VPN secure? How to check for leaks
    A trustworthy virtual private network (VPN) is a good way to keep your internet usage secure and private whether at home or on public Wi-Fi. But just how private is your activity over a VPN? In other words, how do you know if the VPN is doing its…
    - 20 Mar 18, 12:10pm -
  • How—and why—you should use a VPN any time you hop on the internet
    Surfing the web through a virtual private network ensures that your online activities are both private and secure.
    - 6 Jul 17, 11:53pm -
  • 6 ways to lock down your iPhone’s lock screen
    Just because your iPhone is locked with a passcode or Touch ID doesn’t mean it’s safe from prying eyes and fingers. From text message notifications to Siri, your phone’s lock screen is brimming with alerts, features, and settings that anyone…
    - 16 May 17, 10:30am -
  • Three privacy tools that block your Internet provider from tracking you
    It's official: Congress has sold you out to Internet service providers, passing a bill that dismantles Internet privacy rules and allows ISPs to sell your web history and other personal information without your permission. Assuming President Trump…
    - 29 Mar 17, 3:04pm -
  • How to keep a private stash of bookmarks in Chrome
    Incognito Mode in Chrome can keep your browsing history secret unless you have a nosy Internet Service Provider, and you’re not using a VPN. But one thing incognito doesn’t keep secret are any bookmarks you’ve got. If you’ve ever wanted t…
    - 28 Mar 17, 12:00pm -