Cyberterrorism

Cyber Attacks | News, how-tos, features, reviews, and videos

number five
stateofcybercrimethumb

pt 2 image
video

U.S. Cyber Command gains status | Salted Hash Ep 1, Pt 2

Reporters Steve Ragan and Fahmida Rashid discuss the implications of the U.S. Cyber Command's recent elevation in status, putting it on the same level as the military’s other functional combatant commands.

cybersecurity stock

Harvard PhD Andy Yen provides tips to governments on cybersecurity protections

Harvard PhD provides thoughts on innovative Cybersecurity hacks and protections.

Mingis_on_Tech
video

Mingis on Tech: How linguistics can help catch cyberattackers

When it comes to tracking down the bad actors behind malware and ransomware, cybersecurity firms are turning to linguists.

fbis most wanted cybercriminals

FBI's top 10 most wanted cybercriminals

The internet has impacted the world in numerous ways, but it isn't always positive. Thanks to technology, we now have the rise of the cybercriminal, and the FBI even has a most wanted list for these criminals.

The Forbidden City in Beijing, China

China pays for Windows XP addiction as 'WannaCry' hits

The WannaCry ransomware has wormed its way into tens of thousands of Windows PCs in China, where Windows XP remains relatively popular.

rsa 2017 v2 series branded lg

The state of privacy and security in an ever-evolving world

Privacy and security have evolved. We are seeing various breaches that are devastating organizations. How can you secure your data in a world full of mobile devices, IoT, and the cloud?

hacker hack attacke cyber malware keyboard

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The latest campaigns are bigger, more sophisticated, and causing far more damage as the attackers learn new techniques and collaborate with other groups

8 small business security

How your company needs to train workers in cybersecurity

Businesses are being urged to train their workers to be more vigilant than ever to protect passwords and sensitive data and to recognize threats.

What prevents breaches: process, technology or people? One answer is PC, and one is right.

Many experts say that people are more important than process in the IT security world. That is politically correct, as opposed to actually correct.

fail stamp

Bank gets lesson in the security failings of third parties

Brazilian bank was an easy target after its DNS provider was compromised.

security thinkstock

How you can be the smartest cybersecurity expert in the room

Information security is the hottest topic of 2017 with billions of dollars in investments planned. Yet few people have even a basic understanding of the key principles.

Cyber security breach attack on monitor with binary code

How to navigate the changing landscape of cybersecurity

The world of cybersecurity has changed drastically over the past couple of decades. We have evolved from a world of keystroke logging and trojans to a universe of full fledged ransomware and cyber warfare.

fbi primary3

FBI chief calls for private sector to help battle cybercrime

As the FBI has been expanding and retooling its approach to cyber investigations, Director James Comey stresses need for CISOs to engage with the bureau.

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

ecommerce thinkstock

5 ecommerce fraud predictions for 2017

Ecommerce fraud is on the rise as more consumers turn to online shopping. Luckily, by being vigilant, merchants can fight fraud and win.

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage.

brad smith 2014 1134x1200

Microsoft's president wants a Geneva Convention for cyberwar

Microsoft is calling for a “Digital Geneva Convention,” as global tensions over digital attacks continue to rise. The tech giant wants to see civilian use of the internet protected as part of an international set of accords, Brad...

combat cyber crime ts

How Facebook and Google are battling internet terrorism

Leading platform providers are exploring new ways to actively engage in counter-messaging, building on robust systems to flag and remove extremist content.

Load More