Islamic State militants are planning the creation of a ‘cyber caliphate’ protected by their own encryption software – from behind which they will launch massive hacking attacks on the U.S. and the West.
New and subtle business models are emerging for cybercriminals, boosting their sales of stolen data and offering new ways to inflict damage on target organisations. Hackers are commercialising stolen data by selling it back to legitimate businesses, one security expert has warned.
Rogue cell phone towers can track your phone and intercept your calls, and it’s only a matter of time before they’re as ubiquitous as GPS trackers. But at least now there’s a way to spot them.
Islamic State militants are planning the creation of a ‘cyber caliphate’ protected by their own encryption software – from behind which they will launch massive hacking attacks on the U.S. and the West.