- The WIP hosted #LocalVoicesTalk about Women in Islam, a Twitter event. July 22, 2014
- Infrastructure Hackers, Script Kiddies and “Watchdogs”: A Round-up of Monsters Under the Bed from CIS/MS-ISAC June 5, 2014
- Recent Activity from The European Cyber Army (ECA) April 15, 2014
- Summary of 2013 Malware Development March 26, 2014
- Turkey Thrashes Twitter, Leaks put Gov in a Twist March 21, 2014
- Commerce Dept. Cans ICANN March 21, 2014
- Point of Sale Target’ed, Millions of Credit Cards Scraped. February 12, 2014
- Hotels May Become New Data Breach Point February 12, 2014
- New White House Initiative Pledges $750 Million for Student Technology February 12, 2014
- Mask/Careto Unmasked, Shadowy Spanish Spybots Slink into Sunset February 12, 2014
Categories » News
Credit cards have more legal protection than debit cards, but a quick response is the key to keeping intruders from your accounts and identity. Continue reading
A man is jailed for posting revenge porn to Facebook, making him the first person to be imprisoned under a new Californian law. Continue reading
Americans retailers and banks are preparing for the wide release of a security technology in which a chip embedded into credit and debit cards can substantially reduce many forms of fraud. Continue reading
A security firm identified Iranian hackers as the source of coordinated attacks against more than 50 targets in 16 countries, many of them corporate and government entities. Continue reading
The Defense Department and leading computer scientists are working together to improve security by imagining an Internet rebuilt from scratch. Continue reading
The naïveté of new Internet users, and an emphasis on bolstering the web’s growth, have left China’s more than 600 million Internet users vulnerable to cybercrime.
Entrepreneurs are addressing the need for tighter corporate security, but skewed valuations are making it more difficult to determine which companies are a safe bet. Continue reading
The breach exposed two things the movie industry loathes — the piracy of films and details about executive compensation — and sent a ripple of dread across Hollywood.
Employee salary, health data mixed in with other corporate data leaked. Continue reading
Operation Cleaver gets near-complete control of airlines, gas producers, defense. Continue reading
Are we really at risk of smart machines killing us off? Continue reading
Advanced tactics raise the bar on spearphishing attacks, making them harder to spot. Continue reading
Prosecutors invoke 18th-century All Writs Act to get around thorny problem. Continue reading
James Hoff’s art glitches music and images with malware like NSA-created Stuxnet and the ILOVEYOU viruses.
The post This Artist’s Images Integrate Code From Malware Like Stuxnet and Flame appeared first on WIRED.
The defense attorney for one young hacker with ties to Anonymous argues prosecutors indicted his client on 44 baseless felony charges as an intimidation and smear tactic. The post Oops: After Threatening Hacker With 440 Years, Prosecutors Settle for a … Continue reading
How the world’s first real computer, the ENIAC, was restored by an unlikely group of conservationists—all thanks to Ross Perot.
The post How the World’s First Computer Was Rescued From the Scrap Heap appeared first on WIRED.
The security company indicated that a powerful program that could only have been created by a “nation state” has been finding its way into computer systems for six years.