The United States comes up constantly when you talk to Russians about their country’s place in the world. But the conversations tend to go a lot differently than many Americans might expect.
TALLINN, Estonia (AP) — About 400 computer experts will participate in a major cybersecurity drill in Estonia this week as part of NATO’s efforts to upgrade its capability to counter potentially debilitating hacker attacks.
If you’ve ever wondered what a government has left in its last breath of an argument it’s already lost, it’s almost certainly going to have something to do with “national security.
North Korea’s cyberattack on Sony Pictures exposed a new reality: you don’t have to be a superpower to inflict damage on U.S. corporations The following script is from “The Attack on Sony” which aired on April 12, 2015. Steve Kroft is the correspondent. Graham Messick, producer.
In light of the latest global surveillance leaks on Thursday by former U.S. government contractor Edward Snowden, scanners at U.S. airports that catalog you in full birthday-suit glory seem somewhat tame.
We had been noting, in the wake of the Charlie Hebdo attacks in France, how the country that then held a giant “free speech” rally appeared to be, instead, focusing on cracking down on free speech at every opportunity. And target number one: the internet.
New and subtle business models are emerging for cybercriminals, boosting their sales of stolen data and offering new ways to inflict damage on target organisations. Hackers are commercialising stolen data by selling it back to legitimate businesses, one security expert has warned.
A total of 1,228 popular Android apps found in the Google Play store are still vulnerable to a FREAK attack, FireEye says. Research published on Tuesday by the firm’s security team disclosed just how vulnerable both Android and iOS apps still are to the FREAK bug.
In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails. In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails.
What are the ethics of platform design? One of the reasons that Facebook study on user emotions was so controversial is that it touched on the kinds of ethics we expect — or don’t expect — from platform designers.
Researchers at network security company Palo Alto Networks have uncovered a new and sophisticated form of malware which attacks iOS devices through USB connections from OS X systems. They have called it WireLurker. Palo Alto Networks says that “…
Malware that cannot be uninstalled by the end user is being pre-loaded onto some cheap Android smartphones. The malware is pre-loaded into the system directory of the handsets at an unknown point within the supply chain.