North Korea on Saturday blamed the U.S. for its nine-and-a-half-hour Internet outage earlier in the week, and called President Barack Obama a "monkey" as part of a racist, vitriolic statement issued by the country's highest government body, the National Defense Commission (NDC).
cyberwarfare - News, Features, and Slideshows
China's state-run TV is telling iPhone owners that the device is a threat to national security because it tracks their movements.
The Department of Homeland Security mistakenly released details on an experiment in which a 27-ton generator was destroyed via a cyberattack.
A sophisticated Chinese hacker group that had been stealing information from U.S. policy experts on Southeast Asia suddenly changed targets last month to focus on Iraq, security researchers said Monday.
The National Security Agency Monday defended its data collection practices amid revelations that almost 90% of the data it sweeps up involves ordinary Internet users not suspected of crimes.
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
The remarkable success that Chinese state-sponsored groups have had in infiltrating U.S. government, military and corporate networks in recent years should not be mistaken as a sign of growing technical superiority over the U.S. in cyberspace, security experts said.
Applying Big Data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held here this week.
China is by far the most aggressive, but not the only, country attempting the sort of extensive cyberespionage described in security firm Mandiant's dramatic report, released this week.
More DDoS attacks on banks, cyberwarfare, and targeted attacks could well be in store in 2013, security experts warn.
- The Future is Encrypted. What's your defense?
- How to Use Metadata to Make Data-Driven Decisions - Download NOW!
- See Your Traffic for What It Really Is
- The Future is Encrypted. Manage It.
- Check your Future Risk
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- Harnessing the Power of Metadata for Security: FIND OUT MORE
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today