Cyberterrorism

Cyberterrorism news, analysis, research, how-to, opinion, and video.

pixabay cybersecurity stock

fbis most wanted cybercriminals

FBI's top 10 most wanted cybercriminals

The internet has impacted the world in numerous ways, but it isn't always positive. Thanks to technology, we now have the rise of the cybercriminal, and the FBI even has a most wanted list for these criminals.

12973123 10106415969507493 6982208931759200481 o

China pays for Windows XP addiction as 'WannaCry' hits

The WannaCry ransomware has wormed its way into tens of thousands of Windows PCs in China, where Windows XP remains relatively popular.

hacker hack attacke cyber malware keyboard

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The latest campaigns are bigger, more sophisticated, and causing far more damage as the attackers learn new techniques and collaborate with other groups

8 small business security

How your company needs to train workers in cybersecurity

Businesses are being urged to train their workers to be more vigilant than ever to protect passwords and sensitive data and to recognize threats.

What prevents breaches: process, technology or people? One answer is PC, and one is right.

Many experts say that people are more important than process in the IT security world. That is politically correct, as opposed to actually correct.

fail stamp

Bank gets lesson in the security failings of third parties

Brazilian bank was an easy target after its DNS provider was compromised.

security thinkstock

How you can be the smartest cybersecurity expert in the room

Information security is the hottest topic of 2017 with billions of dollars in investments planned. Yet few people have even a basic understanding of the key principles.

Cyber security breach attack on monitor with binary code

How to navigate the changing landscape of cybersecurity

The world of cybersecurity has changed drastically over the past couple of decades. We have evolved from a world of keystroke logging and trojans to a universe of full fledged ransomware and cyber warfare.

fbi primary3

FBI chief calls for private sector to help battle cybercrime

As the FBI has been expanding and retooling its approach to cyber investigations, Director James Comey stresses need for CISOs to engage with the bureau.

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage.

brad smith 2014 1134x1200

Microsoft's president wants a Geneva Convention for cyberwar

Microsoft is calling for a “Digital Geneva Convention,” as global tensions over digital attacks continue to rise. The tech giant wants to see civilian use of the internet protected as part of an international set of accords, Brad...

combat cyber crime ts

How Facebook and Google are battling internet terrorism

Leading platform providers are exploring new ways to actively engage in counter-messaging, building on robust systems to flag and remove extremist content.

DHS should have a cybersecurity unit, says panel chairman

The chairman of the U.S. House Committee on Homeland Security said his top priority in 2017 will be to push for creation of a cybersecurity agency within the Department of Homeland Security.

Tom Ridge

Former DHS head urges Trump to see economic dangers from cyberattacks

Last week's U.S. intelligence report tracing Russia's cyber-meddling with the 2016 presidential election is a timely reminder of the cybersecurity risks that the government and private companies face, said Tom Ridge, the nation's...

cybersecurity budgets

Corporate boards aren't prepared for cyberattacks

CEOs, board members need to bone up on cybersecurity and not leave those matters to CIOs, analyst says

cloud building security

Top 4 security trends of 2016

As digital transformation overtook the enterprise in 2016, security professionals have struggled to keep up with a shifting technology and cultural landscape while keeping one eye ahead on the threat horizon.

malware attack cyberespionage code hacker

Cyberattack suspected in Ukraine power outage

A new power outage that affected parts of Kiev and the surrounding region in Ukraine late Saturday might have been the result of a cyberattack.

Load More