- Welcome Guest
- Sign In
Symantec on Tuesday disclosed the existence of a group of 50 to 100 top-rate hackers. Named "Hidden Lynx," the group is an advanced persistent threat that has skills well ahead of similar organizations in the region, such as APT1, Symantec said. "The Hidden Lynx group is methodical in its approach a...
Chinese telecommunications firm Huawei is taking a PR victory lap following reports suggesting that the National Security Agency spied on the company. Earlier this week, Brazilian TV network Globo revealed a raft of documents that purportedly came from Edward Snowden. The files implicate the NSA, al...
The National Security Agency's efforts to include "backdoors" in U.S. companies' security products, networks and devices -- thereby making it easier for the NSA to snoop around -- could hurt business abroad. Specifically, foreign countries could come to view U.S. firms' relationship with Washington ...
As America crawls toward retaliation against Syria for its government's use of chemical weapons on its citizens, debate rages over what form it should take. Could cyberweapons be part of such an action? "Cyberweapons are just another piece of our military arsenal and should be considered along with ...
News that the U.S. National Security Agency has worked steadily for at least the past decade to systematically undermine security has sparked an uproar on the Internet. The agency -- whose motto is "Defending Our Nation. Securing the Future" -- reportedly has circumvented or cracked much of the en...
As I write this, the U.S. has deployed a battle group to Syria in preparation for a missile strike against the government there, and Russia has deployed what appears to be a counter force. What most seem not to be factoring in is that Syria has already fired its warning shot with attacks on Twitter ...
The Syrian Electronic Army -- widely suspected of being comprised of pro-Syrian government hacktivists -- on Tuesday hijacked The New York Times' website and briefly took over Twitter's domain name system servers. The SEA's main motive is to gain visibility for its cause, said Jaeson Schultz, a Cisc...
Nokia sent a letter to India's commerce ministry threatening to leave the country because of Indian taxes. The letter said that the "political risk" in India was increasing due to tax claims from the government. India's passage in March of a retroactive income tax violates a bilateral treaty between...
Chinese websites with the ".cn" domain name extension fell on Sunday to a distributed denial of service, or DDoS, attack, the state-run China Internet Network Information Center reported. Two attacks reportedly were launched -- the first at midnight on Sunday and the second at 4 p.m. China's Ministr...
London editor Alan Rusbridger wrote a column Monday detailing how British law enforcement had destroyed hard drives at his newspaper's offices. The destruction was purportedly to prevent additional leaks about the National Security Agency. Prior to destroying the hard drives, Rusbridger writes, an o...
The partner of Glenn Greenwald, the journalist with The Guardian who has published a slew of articles detailing National Security Agency surveillance programs, was detained for nearly nine hours Sunday at London's Heathrow Airport. Greenwald's partner, David Miranda, was en route from Berlin to his ...
The Syrian Electronic Army on Thursday claimed credit for hack attacks that took control of portions of a handful of major U.S. news sites via an article-recommendation service they all use. SEA reportedly gained control of them by entering an administration portal for Outbrain and inserting links i...
China's Ministry of Public Security and a cabinet-level research center are teaming up to probe IBM, Oracle and EMC over security issues. The upcoming investigation could be more than a simple tit-for-tat in the ongoing cybersaga between the U.S. and China. The probe follows Edward Snowden's allegat...
A hacker was able to gain access to a baby monitor on Saturday night, terrifying a Texas couple as they heard the virtual intruder speak offensively to their sleeping daughter. The parents use an Internet-connected baby monitor that is equipped with a camera to monitor the activity in their 2-year-o...
Android device owners who use Bitcoins may have their digital currency stolen because of a security flaw in Android, the Bitcoin Foundation has warned. The problem may lie in Android's implementation of the java.security.SecureRandom application programming interface in Java. It was first publicized...