iOS app Android app

Cyber Attacks

Designing Degrees for Digital Gatekeepers

Edward Guiliano, Ph.D. | Posted 01.25.2014 | College
Edward Guiliano, Ph.D.

In this environment, enter universities that are designing degrees, creating knowledge, framing debates, and developing solutions about pressing issues (before, during, and after they become problems). Take cyber security.

3 Major Database Companies Hacked

Reuters | Jim Finkle | Posted 11.25.2013 | Technology

BOSTON (Reuters) - Three major U.S. data providers said on Wednesday they were victims of cyber attacks, after a cybersecurity news website linked the...

Is Anything Safe Online?

Michael Gregg | Posted 11.16.2013 | Technology
Michael Gregg

The reality is, there's never been any such thing as online privacy. Just because the website you're on has a lock symbol in the address bar, doesn't mean it's 100 percent safe. Here are four ways you didn't know you could get hacked.

12 Years After 9/11: Understanding the Threats We Face and How Far We Have Come

Sen. Jay Rockefeller | Posted 11.13.2013 | Technology
Sen. Jay Rockefeller

Every year on September 11, we mourn the nearly 3,000 people who lost their lives that tragic day. We honor the firefighters, police officers and first responders who risked and gave their lives to save so many others.

The Urban Myth About Car Thieves That's True

Hemanshu Nigam | Posted 10.18.2013 | Crime
Hemanshu Nigam

According to authorities around the world, however, this disturbing trend in digital crime represents a sobering reality for owners of vehicles with keyless entry systems.

The Internet Knows More About You Than You Think (INFOGRAPHIC)

Posted 10.18.2013 | Entertainment

Paranoid about your online footprint? You should be. It's easier than ever for cyber thieves to access your personal data, and something as simple and...

Cyber Terror Is the New Language of War

Sen. Byron Dorgan | Posted 09.16.2013 | Politics
Sen. Byron Dorgan

How dangerous could these cyber attacks be? Consider what might happen if our water supply, our electric grid, or the Internet was successfully shut down by a cyber attack.

PRISM: An International Relations Disaster?

Matthew Dunn | Posted 09.09.2013 | Politics
Matthew Dunn

For all the rhetoric coming out of China, Russia, parts of Europe, and elsewhere, PRISM isn't an international relations disaster. Sadly, the real "disaster" was incremental and happened over years, culminating in a break down in trust before the PRISM revelations.

Cyber Warfare: What Are the Rules?

Daniel Garrie | Posted 06.17.2013 | World
Daniel Garrie

With the advent of cyber warfare the complexity of what is war is even more clouded and the application of law to this is even murkier.

Strategic Stability in Cyberspace

Franz-Stefan Gady | Posted 08.09.2013 | Politics
Franz-Stefan Gady

One of the principle questions moving forward will be how the United States and China can manage to contain their disagreements over cyberspace without an escalation in cyber rivalry and the risk of a full-scale cyber war.

Finding a Cure for China's Technology Theft

Rebecca Abrahams | Posted 07.28.2013 | Technology
Rebecca Abrahams

The classical division between classified information and unclassified information is no longer functional. We need to implement encryption, not classification, for all government materials that are not accessed by the public, and particularly for defense information.

Gerry Smith

'Hacking Back' Could Deter Chinese Cyberattacks, Report Says | Gerry Smith | Posted 05.22.2013 | Technology

A group assessing China's role in stealing trade secrets from American companies wants the U.S. government to consider a controversial method for prot...

One Star Revenge: When Reviews Become Malicious

Janice Harper | Posted 07.09.2013 | Books
Janice Harper

How did a book on conservation in Madagascar that was published over a decade ago become another casualty of the sensationalized Jodi Arias trial?

Jaws, Nuclear Weapons, and Cyber War

Franz-Stefan Gady | Posted 07.01.2013 | World
Franz-Stefan Gady

The top Chinese official of the People's Liberation Army, General Fang Fenghui recently announced that the consequences of a major cyber attack "may be as serious as a nuclear bomb." His remarks are symptomatic of the global uncertainty surrounding the results of a 'major cyber attack.'

Major Daily Deal Site Hacked, Millions Of Customers Affected

Reuters | Posted 06.26.2013 | Technology

By Alistair Barr SAN FRANCISCO (Reuters) - LivingSocial, the second-largest daily deal company behind Groupon Inc, said on Friday it wa...

Recalibrate U.S. Cyber Efforts to Better Meet the High-end Threat From Nation-states

Frank J. Cilluffo | Posted 06.01.2013 | World
Frank J. Cilluffo

In the discussions about cyber threats that continue and expand daily, there is a tendency to lump together all types of threat regardless of where they fall on the spectrum.

Chinese Hacking and The Art of War

Peter Navarro | Posted 05.21.2013 | World
Peter Navarro

Finally, there appears to be real alarm in the White House over Chinese cyberattacks. Here's what the president should be telling the American people.

Stop the Press: Media Outlets Falling Victim to Cyber Attacks

David Garfield | Posted 05.07.2013 | Media
David Garfield

As the New York Times itself admitted, traditional security technology such as firewalls and anti-virus were unable to stop recent cyber attacks. So how can organizations prevent such targeted cyber attacks? Following these four steps to cyber health is a good start.

Cyber Espionage: Reducing Tensions Between China and the United States

Franz-Stefan Gady | Posted 04.27.2013 | World
Franz-Stefan Gady

I appeared on the talk show 'The Fresh Outlook' this weekend to discuss cybersecurity issues and China. Here is a link to the video. I argued for a more nuanced, less panicky approach when dealing with China on this sensitive subject. Here are some more thoughts.

Cybertheft Threat Underscores Crucial Need to Protect American Intellectual Property

Chris Dodd | Posted 02.21.2013 | Technology
Chris Dodd

Front-page news this week that Chinese cyber hacking may have been sanctioned by the Chinese military has once again drawn significant attention to the critical need for the United States to step up the protection of its intellectual property.

Obama, Preemptive Cyberwarfare and the Banks

Ben Hammersley | Posted 04.15.2013 | Politics
Ben Hammersley

What does "evidence of a major digital attack looming" look like? There are no convoys to see from a spy plane, no fleet heading sailing towards Hawaii. Without an idea of what this evidence is, the guidelines seem to justify preemptive attacks against just about anyone at any time.

Gerry Smith

How Banks Are Outsourcing Their Defense Against Cyber Attacks | Gerry Smith | Posted 01.10.2013 | Technology

For weeks, hackers have attacked many of the country's largest banks, disrupting their websites and frustrating customers who have been unable to acce...

Massive Bank Cyber Attack Threat Deemed Credible In New Report

The Huffington Post | Katherine Bindley | Posted 12.13.2012 | Money

A potential cyber attack against 30 U.S. banks known as Project Blitzkrieg has been deemed a credible threat by a report released from the security so...

When Your Identity Is Tossed Out the Window... Literally

Adam Levin | Posted 01.30.2013 | Technology
Adam Levin

From identity theft to cyber-warfare, our inability to weigh risks in a rational way is costing us big time --- and may ultimately be our undoing.

Congress Urged To Probe China's Cyber Attacks

Reuters | Jim Wolf | Posted 01.13.2013 | Technology

By Jim Wolf WASHINGTON (Reuters) - The U.S. Congress should conduct an in-depth assessment of Chinese cyber spying and consider imposin...