iOS app Android app

Cyber Attack

Outlaw Chinese Steel

Leo W. Gerard | Posted 05.02.2016 | Business
Leo W. Gerard

Forged with the despicable dividend of stolen trade secrets, priced with monopoly collusion, then traded with fraudulent labeling to dodge U.S. duties, steel from China violates every principle of capitalism.

Hackers Are Learning Customer Service Tactics To Target Victims

Reuters | Casey Williams | Posted 04.12.2016 | Technology

TEWKSBURY, Mass (Reuters) - When hackers set out to extort the town of Tewksbury, Massachusetts with "ransomware," they followed up with an FAQ explai...

Hackers Are Using Expired Domains To Launch Attacks

Reuters | Casey Williams | Posted 03.17.2016 | Technology

March 16 (Reuters) - Expired domain names are becoming the latest route for cyber criminals to find their way into the computers of unsuspecting users...

Unlocking iPhone Would Expose 'Hundreds Of Millions' To Cyber Attacks, Apple Says

Reuters | Casey Williams | Posted 02.29.2016 | Technology

WASHINGTON (Reuters) - Unlocking an iPhone used by one of the San Bernardino shooters would leave hundreds of millions of Apple Inc device owners vuln...

UC Berkeley Alerts 80,000 People To Cyber Attack

Reuters | Lee Moran | Posted 02.27.2016 | Technology

SAN FRANCISCO (Reuters) - Officials at the University of California Berkeley said on Friday that they were alerting 80,000 people, including current a...

Hacktivists Couldn't Have Pulled Off Cyber Attacks On Sony

Reuters | Casey Williams | Posted 02.24.2016 | Technology

SAN FRANCISCO (Reuters) - The perpetrators of the 2014 cyber attack on Sony Pictures Entertainment were not activists or disgruntled employees, and li...

The U.S. Must No Longer Accept China's Denial of Government-Sponsored Hack Attacks

Rep. Matt Salmon | Posted 01.11.2016 | World
Rep. Matt Salmon

I encourage the Chinese leadership to consider whether the imbalance between maintaining domestic stability and stifling free speech and limiting free access to information will eventually impair Chinese citizens, as well as China's true national potential.

Chinese Government Says It's Not Behind Massive U.S. Hack

Reuters | Lorenzo Ligato | Posted 12.02.2015 | Technology

China's official Xinhua news agency said on Wednesday that an investigation into a massive U.S. computer breach last year that affected more than 22 m...

Iranian Military Hackers Reportedly Targeting Obama Administration

Reuters | Jade Walker | Posted 11.05.2015 | Technology

Iran's Revolutionary Guards stepped up hacking of email and social media accounts of Obama administration officials in recent weeks in cyber attacks b...

Why Technology, Not Geography, Is Key to Cybersecurity

Carl Bildt | Posted 10.26.2015 | World
Carl Bildt

SEOUL -- The solution to privacy concerns lies not in data localization, but in the development of secure systems and the proper use of encryption. Data storage actually means the continuous transfer of data between users, with no regard for Westphalian borders. Policies born of confusion, chaos and confrontation have no place in this new world of opportunities.

Hackers Launch Second Cyber Attack On Planned Parenthood

Reuters | Jade Walker | Posted 07.30.2015 | Technology

Planned Parenthood said electronic traffic to its websites was snarled by computer hackers on Wednesday in the second cyber attack mounted against the...

White House Kicks Off Cyber Marathon To Stop Intrusions

Reuters | Posted 07.11.2016 | Politics

(Repeats story with no change to text) By Roberta Rampton WASHINGTON, July 11 (Reuters) - The federal government could ...

Symbols and Cymbals Mark Fourth of July

Gary Stein | Posted 07.02.2016 | Politics
Gary Stein

You can climb a pole and yank down a flag, but the culture of racism and hatred will still be there. On the flip side, you can sew a U.S. flag into a shirt or burn it in effigy in the Middle East, but this less-than-perfect nation will still stand.

'Anonymous' Launch Cyber Attack On Madison After Tony Robinson Killing

The Huffington Post | Carey Gillam | Posted 03.11.2015 | Black Voices

(Reuters) - Cyber attackers are targeting city and county computer systems in Madison, Wisconsin, in retaliation for the shooting death of a 19-year-o...

Sony Hack Attacks Presage New Warfare: The Weaponization of Code

Alec Ross | Posted 02.15.2015 | World
Alec Ross

What is important is that these hacks presage what is going to happen for years to come and at far greater cost than what is being imposed on Sony. The weaponization of code is the most significant development in warfare since the weaponization of fissile material.

Kathleen Miles

Security Experts Warn Of Potentially Dire Russian Threat | Kathleen Miles | Posted 04.30.2014 | World

Former U.S. security officials warned on Tuesday that Russia may use cyber warfare against the U.S. and Ukraine if tensions between the two sides cont...

Allied Cyber Forces? Yes Please.

Brian E. Finch | Posted 06.28.2014 | Politics
Brian E. Finch

Often lost in the debate over surveillance and the actions of the National Security Agency is that cyber space is a potential battlefield where countr...


Reuters | Timothy Heritage and Maria Tsvetkova | Posted 05.14.2014 | Media

By Timothy Heritage and Maria Tsvetkova MOSCOW (Reuters) - Victories are hard to come by for Vladimir Putin's opponents, activists are ...

Cyber Attack On Bitcoin Exposes Currency's Vulnerabilities

Reuters | Emily Flitter | Posted 04.15.2014 | Technology

By Emily Flitter NEW YORK (Reuters) - A massive cyber attack from unknown sources that has been spamming bitcoin exchanges is highlight...

The Obsession With Negativity in the Cyber World

Jennie Shulkin | Posted 04.09.2014 | College
Jennie Shulkin

The words we say online do have an effect, and we need to consider that when posting.

Beware: Cybercrooks Are Becoming More Sophisticated

Michael L. Berman | Posted 03.31.2014 | Technology
Michael L. Berman

More attacks, more malicious websites and more vulnerability on the part of the average computer user.

Report: More U.S. Retailers' Security Breached, Joining Target And Neiman Marcus

Reuters | Posted 03.13.2014 | Business

By Jim Finkle and Mark Hosenball BOSTON/WASHINGTON, Jan 11 (Reuters) - Target Corp and Neiman Marcus are not the only U.S. retailers ...

Bank Warns 465,000 Customers About Cyber Attack

Reuters | David Henry and Jim Finkle | Posted 02.20.2014 | Technology

(Adds statements from Louisiana and Connecticut officials) By David Henry and Jim Finkle NEW YORK/BOSTON, Dec 5 (Reuters...

NatGeo's American Blackout Presents Scary Portrayal of Powerless Nation

Aaron Sagers | Posted 01.23.2014 | Entertainment
Aaron Sagers

What does it mean to be powerless? That question is at the center of American Blackout, a new found-footage style suspense/horror movie from National Geographic Channel that imagines 10 days of a nationwide power outage caused by a devastating cyber-attack.

Anything and Everything Can Be Hacked

Brian E. Finch | Posted 10.15.2013 | Technology
Brian E. Finch

The 2013 Black Hat conference this past week proved once again that anything and everything can be hacked.