iOS app Android app


Six Ways Hillary Clinton's Email Could Have Been Hacked

Michael Gregg | Posted 09.02.2015 | Technology
Michael Gregg

As the FBI investigates the private email account Hillary Clinton used while serving as Secretary of State, more questions are being raised about just how safe and secure her private email server really was. Of course, the biggest question of all is, could it have been hacked?

8 Things You Should Know About the Office of Personnel Management Breach

Michael Gregg | Posted 06.26.2015 | Technology
Michael Gregg

For almost a month, the Office of Personnel Management (OPM) has been engaged in damage control after publicly disclosing that it was the victim of a massive data breach of government employee data.

New Snowden Findings Suggest Cyber-Espionage Program Used By Several Countries

Reuters | Posted 01.27.2015 | World

SAN FRANCISCO, Jan 27 (Reuters) - A program used by U.S. and British spies to record computer keystrokes was part of sophisticated hacking operations ...

The Axiom Report: Cybersecurity and Its Impact on China-U.S. Relations

Franz-Stefan Gady | Posted 01.05.2015 | Politics
Franz-Stefan Gady

While the actual impact of the Novetta report on making U.S. systems more secure from Chinese attacks in the long run will be negligible on the diplomatic front, the recent Axiom revelations will allow the U.S. government to press the Chinese side harder on contentious cybersecurity issues.

Gerry Smith

Vladimir Putin Employs An Army Of Skilled Hackers, Report Finds | Gerry Smith | Posted 10.28.2014 | Technology

Some of the most sophisticated hackers in the world may be taking orders from one of the U.S. government's biggest adversaries: Russian President Vlad...

Chinese Cyber-Attacks: Will the United States Step Up Its Active Cyber Defense Posture?

Franz-Stefan Gady | Posted 07.27.2014 | Politics
Franz-Stefan Gady

To avoid escalatory steps, the United States and China have to find ways to have an open and fair dialogue on cyber-espionage and other cybersecurity related issues.

De-Escalation in Cyberspace: It is China's Turn to Act!

Franz-Stefan Gady | Posted 07.07.2014 | Politics
Franz-Stefan Gady

While there is an inherent asymmetry between U.S. and Chinese military capabilities in related technology, this should not be used as an excuse by the Chinese leadership to avoid a more open engagement with the United States in the coming months and try to break the cyber stalemate between the two rivals.

Oh, By the Way, Germany Spies on Us

Keith Thomson | Posted 09.18.2014 | World
Keith Thomson

Project Rahab uses SIGINT -- intelligence based on interception of signals, conversations and electronic communications -- to gather information on foreign business competition that can benefit German companies.

Gerry Smith

Chinese Cyberspies Hack Small Businesses, But Not For The Reason You'd Think | Gerry Smith | Posted 09.05.2013 | Technology

A wide range of small businesses and institutions -- from pizza restaurants and medical clinics to synagogues and universities -- have been both victi...

Gerry Smith

This Is Costing The U.S. As Many As 500,000 Jobs Per Year | Gerry Smith | Posted 07.25.2013 | Technology

Beginning in 2000, Chinese hackers began spying on Nortel Networks, one of the world's largest telecom equipment makers, breaking into executives' com...