Cybersecurity
-
Why has a major cyber warfare power like Russia launch so few and such ineffective cyber attacks against Ukraine and its sympathizers? New Atlas looks into the digital battle for Ukraine and its implications for the future.
-
IBM security analysts have discovered a global phishing campaign designed to infiltrate organizations associated with managing cold chain supplies of COVID-19 vaccines. The analysis suggests this campaign bears the hallmarks of nation-state spycraft.
-
Every year, the Bulletin of the Atomic Scientists updates the status of its Doomsday Clock. The closer to midnight that the minute hand moves, the bigger the threat of catastrophe. And the 2020 clock is the most dire warning to date.
-
Lockheed Martin, the Missile Defense Agency and the USAF connected an F-35, U-2 spy-plane, and a ground station as part of a missile defense exercise.
-
In an expansive submission to the Australian Parliament, Apple has strongly condemned the government’s prospective anti-encryption legislation, arguing “this is no time to weaken encryption,” and calling the draft outline “extraordinarily broad” and “dangerously ambitious.”
-
IBM Research has released its annual “5 in 5” list, outlining five technologies that the company believes will be instrumental over the next five years. This year’s list focuses on security and AI, predicting that by 2023 we’ll have unhackable encryption, unbiased AI and mainstream quantum computers
-
Cyberwarfare is a growing problem, with 2017 seeing some of the most devious attacks ever. As part of a US$50-million DARPA program to improve cybersecurity, computer scientists at the University of Michigan are developing a security system baked into the hardware that's said to be “unhackable.”
-
As Tuesday’s ransomware attack continues to spread, several security analysts are saying that this virus may not be ransomware after all, but is actually a cyberattack in disguise.
-
Raytheon will use the 2017 Paris Air Show to showcase the technologies it is developing to provide defenses and countermeasures in the new battleground of cyberspace.
-
In the wake of the recent WannaCry ransomware attack, secretive hacking group The Shadow Brokers has revealed plans to release more stolen data through a subscription service. But who is behind this mysterious disruptive force? Foreign intelligence, anarchic hackers or someone inside the US?
-
Keeping an "air gap" between a hard drive and other devices forces any would-be thief to physically go to the machine ... or so you might think. Researchers have shown that hackers could use the flashing LED on the outside of a computer to beam data to a waiting drone.
-
A new study cautions against typing while Skyping. By analyzing the acoustic signals of key presses, hackers may be able to untangle typed text through the clickety-clack of a keyboard itself, with an alarming accuracy of over 90 percent.
Load More