The United States comes up constantly when you talk to Russians about their country’s place in the world. But the conversations tend to go a lot differently than many Americans might expect.
TALLINN, Estonia (AP) — About 400 computer experts will participate in a major cybersecurity drill in Estonia this week as part of NATO’s efforts to upgrade its capability to counter potentially debilitating hacker attacks.
If you’ve ever wondered what a government has left in its last breath of an argument it’s already lost, it’s almost certainly going to have something to do with “national security.
North Korea’s cyberattack on Sony Pictures exposed a new reality: you don’t have to be a superpower to inflict damage on U.S. corporations The following script is from “The Attack on Sony” which aired on April 12, 2015. Steve Kroft is the correspondent. Graham Messick, producer.
In light of the latest global surveillance leaks on Thursday by former U.S. government contractor Edward Snowden, scanners at U.S. airports that catalog you in full birthday-suit glory seem somewhat tame.
We had been noting, in the wake of the Charlie Hebdo attacks in France, how the country that then held a giant “free speech” rally appeared to be, instead, focusing on cracking down on free speech at every opportunity. And target number one: the internet.
New and subtle business models are emerging for cybercriminals, boosting their sales of stolen data and offering new ways to inflict damage on target organisations. Hackers are commercialising stolen data by selling it back to legitimate businesses, one security expert has warned.
A total of 1,228 popular Android apps found in the Google Play store are still vulnerable to a FREAK attack, FireEye says. Research published on Tuesday by the firm’s security team disclosed just how vulnerable both Android and iOS apps still are to the FREAK bug.
In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails. In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails.
Malware that cannot be uninstalled by the end user is being pre-loaded onto some cheap Android smartphones. The malware is pre-loaded into the system directory of the handsets at an unknown point within the supply chain.
Europol, Europe’s criminal intelligence agency, has painted a grim picture of threats that will be ushered in alongside the Internet of Things (IoT), even predicting that a death caused by an by internet-connected device may happen within the year.
PALO ALTO, Calif. — In late 2013, an A.T.M. in Kiev started dispensing cash at seemingly random times of day. No one had put in a card or touched a button. Cameras showed that the piles of money had been swept up by customers who appeared lucky to be there at the right moment.