Cyberwarfare news, trends, analysis and practical advice

Gemalto now says spies didn't get mobile phone encryption keys

SIM card maker Gemalto has dismissed recent reports that U.K. and U.S. spies obtained encryption keys protecting millions of mobile phones.

Facebook app for Windows 8.1

north korea hack sony security

Code typo helps tie North Korea to the Sony hack

Security firm CrowdStrike on Tuesday presented another piece of evidence to support the argument that last year's devastating hacking attack on Sony Pictures was carried out by a group with ties to North Korea.

DHS cybersecurity staff won’t get paid during shutdown

If Congressional leaders carry through on their threat to shut down the Department of Homeland Security, life for the agency's cybersecurity professionals will be miserable

Equation super cyberspies target Macs with malware, too

The Equation cyberespionage group that used tools similar to those deployed in the past by U.S. intelligence agencies appears to have targeted Macs as well as Windows PCs.

The Fanny superworm is likely the precursor to Stuxnet

The Stuxnet computer worm used to sabotage the Iranian nuclear program was likely preceded by another sophisticated malware program called Fanny, which used some of the same exploits and spread through USB thumb drives.

Real goals of DARPA's next-gen military rely partially on virtual reality.

DARPA's future war looks like a video game

Serious effort to bring genuinely innovative, untouchable capabilities to the U.S. military focuses on augmented reality for ground troops.

us china flags

Obama seeks common ground with China on cyber issues

President Obama and Chinese President Xi Jinping discussed cyber issues and other topics by phone; Xi is scheduled to visit Washington in September.

Lisa Monaco, assistant to President Barack Obama for homeland security and counterterrorism

New U.S. cyberthreat center will fill information gap, official says

The U.S. government needs a new cyberthreat analysis center because no single agency is responsible for producing that type of assessment and sharing information.

keyboard chinese flag china hacker

China seen targeting banks, military in Forbes web attack

A Chinese hacking group infiltrated the site in November and used it to launch targeted attacks against website visitors from U.S. banking and defense companies, a cybersecurity company said.

US to form cybersecurity agency to combat online threats

The Obama administration will create a new agency to monitor cybersecurity threats and share data about possible attacks among government departments.

Anonymous wages cyberwar on ISIS with OpISIS

ISIS is a virus that Anonymous plans to cure: Hacktivists hammer ISIS with #OpISIS

Anonymous launched #OpISIS, waging cyberwar against ISIS propaganda-spewing social media accounts and jihadist militant recruitment sites.

white house fence

White House wants 10% hike in cybersecurity spending

The Obama administration, in its proposed FY 2016 federal budget, wants more money for cybersecurity research, technology and investigators

Binary bomb with a lit fuse code developer security programming

Hackers tapped into Syrian opposition's battle plans

Syrian opposition leaders lost gigabytes of secret communications and battlefield plans to hackers who baited them into downloading malware during flirtatious Skype chats, according to a report released Sunday.


Cyberthreat sharing should include privacy protections, advocates say

U.S. lawmakers are being urged to put strict privacy controls in legislation that would encourage companies to share cyberthreat information with government agencies and each other.

huawei ren zhengfei

Huawei's elusive founder tries to dispel spying concerns and air of mystery

U.S. security concerns may still haunt the reputation of Huawei Technologies, but the Chinese company's elusive founder brushed off any involvement in state-sponsored cyber espionage in a rare interview on Thursday.

NSA National Security Operations Center

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets

Leaked documents indicate that the NSA was in North Korean systems but didn't warn Sony about the attack, covertly uses innocent victims’ infected PCs when hijacking botnets, as well as secretly redirecting blame to scapegoats and...

The NSA not only creates, but also hijacks, malware with Quantumbot

In addition to having its own digital arsenal, the National Security Agency also hijacks and repurposes third-party malware.

iphone users how your government spies on you

iPhone users: How your government spies on you

New Edward Snowden revelations tell us more about iPhone spies.

national security agency headquarters fort meade maryland

Inside North Korea's network, NSA saw signs of Sony attack

The NSA has had a secret foothold for years in North Korea's networks and saw signs of the Sony Pictures Entertainment attack, according to the New York Times.

Load More