cyber crime

  • What is the impact of ‘economic espionage?’

    Tiffany Lopez Winters, executive director of The National Trust Center, joined Fed Access to discuss economic espionage and how it is affecting small businesses, government contractors and federal agencies.

  • Jared Der-Yeghiayan: ICE agent scans darknet for cybercrimes

    A little-known unit of Customs and Immigration Enforcement specializes in tracking down criminals on the darknet.

  • Buried in case data, DHS uncovers collaborative fix

    Homeland Security Investigations said it’s found a way to save precious time and resources for agents and investigators who sift through mass amounts of data and images for the unit’s child exploitation cases.

  • Cars, toasters, medical devices add to DHS’ cyber headaches

    The Science and Technology Directorate’s Cybersecurity Division received dozens of proposals to protect the next emerging area for cybersecurity, called physical systems. S&T will receive 70 proposals across four major areas and award $95 million to the best ideas in early 2015.

  • DoD hosting cyber crime conference

    The Defense Department is taking submissions for its 12th annual Cyber Crime Conference. The conference is sponsored by DoD’s Defense Cyber Crime Center (DC3). Planners expect more than 200 speakers and 20 different track sessions. Participants from agencies, universities and industry are invited to share ways to prevent cyber crime. Submissions for research abstracts are due by July 6th.

  • Lockheed to provide cyber crime support to DoD

    The ceiling value on the contract is $454 million. Most of the work will be located in Linthicum, Md., at at DC3 headquarters.

  • More than 100 nabbed in global bank hack

    More than 100 people have been arrested or charged in the U.S. and the U.K. as part of an alleged global cyber-crime ring, The Wall Street Journal reports.

  • Cyber Warfare Prevention – Securing Your Software and Applications

    Thursday, June 17th The sophistication of security breaches of federal information systems and reports of improper access to these systems continues to grow at an alarming rate. Clearly, there is concern about and a desire to improve the security of these critical infrastructures. So where and how do we begin to effectively safeguard today’s systems from cyber threats and increasing system vulnerabilities? c