The FBI says online threats could soon surpass terrorism and become the number one national security threat; Facebook apps for Android and iOS expose sensitive user information; Forbes publishes a list of hacker prices for OS exploits; and more. FBI: Cyberattacks may represent bigger threat than traditional terrorism: Speaking at the GovSec Conference, Ralph Boelter, assistant director of the counterterrorism division at the FBI, predicted “You’ll see a greater prevalence of cyber-related offenses, including cyber-terrorism.” Last month FBI Director Robert Mueller said that, “in the not too distant future, we anticipate that the cyberthreat will pose the No. 1 threat to our country.” Facebook logins easily stolen from mobile phone apps: Facebook’s apps for Android and iOS do not encrypt users’ login credentials, according to The Register. These apps leave information unprotected in a folder that can easily be accessed by malware. “A problem compounded by Facebook’s idea of ‘temporary’ as lasting beyond the year 4000. In the case of iOS, one can even lift the data from a backup, enabling the hacker to attach to a Facebook account and access Facebook applications for fun and profit.” Facebook has promised to fix the problem. Are Anonymous and Lulzsec now trying to do financial damage?: A study from Imperva reports a change in hacktivist behavior, with an increasing number of attacks aimed at stealing and exposing company data instead of defacing websites or knocking them offline. The study says hackers used local- and remote-file inclusion attacks in 21 percent of all recorded incidents from June to November 2011. All though there is no direct link between the increase and the activities of Anonymous and LulzSec, they have initiated many similar attacks in the past. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Forbes publishes price list for software exploits: Want to crack Apple’s iOS mobile software? It won’t be cheap. Hackers are charging between $100,000 and $250,000 for hacking exploits that take advantage of secret vulnerabilities in iOS. That’s nearly twice the amount requested for information on breaking into Windows and five times as much as the Mac OS. World’s most popular websites infected 10 million visitors in February: Weaknesses at 25,000 of the most popular websites in the world infected 10 million users in February, according to a study by Barracuda Labs. The company ran an analysis of the most popular websites as ranked by Alexa to find whether each URL was serving malicious content and distributing exploits to browsers or extensions. They found that on average at least two of the top 25,000 sites were putting out malicious content every day. Related content opinion Why Bitcoins are Just as Viable as Any Other Currency The true value of any currency is a reflection of how much people believe it's worth, according to CIO blogger Constantine von Hoffman. But it's wise to remember just how fast beliefs can change. By Constantine von Hoffman Apr 15, 2013 4 mins Government Technology Industry opinion No Surprise: Docs Show Obama Administration Lying About Drones President Obama has repeatedly said drones would only be used against members of al Qaida and allied groups. However, leaked intelligence documents show the administration has been using them to settle political and tribal feuds for at least four yea By Constantine von Hoffman Apr 10, 2013 3 mins Regulation Government opinion How Big Data Can Quickly Become Big Garbage The bigger the data the bigger the chance of mistakes or inaccuracies. In that vein, a large database used by retailers to screen people accused of stealing from employers is identifying innocent people and could result in major lawsuits, according t By Constantine von Hoffman Apr 04, 2013 2 mins Big Data opinion Why Crazy Trumps Logic on the Internet The earth is flat. Vaccines cause autism. 9/11 was a government conspiracy. These are just a few of the many ideas that continue to find adherents online despite overwhelming proof that they're not based on fact. CIO.com blogger Constantine von By Constantine von Hoffman Apr 02, 2013 3 mins Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe