cyberwar

Latest stories

35m
CNET
Orwell was right: Oliver Stone on what makes Snowden excitingstate comes home to roost. The surveillance state is everywhere. You pack a lo
Orwell was right: Oliver Stone on what makes Snowden exciting
CNET / Posted 35 minutes ago
state comes home to roost. The surveillance state is everywhere. You pack a lot of issues into the movie -- surveillance, cyberwar and drone warfare. Do you think there's a risk that will overwhelm viewers, or are you hoping people will want to do... Read more
7h
International Business Times
Suspected Russia-based DNC hackers strike again targeting Washington think tanksthink tanks comes even as US security officials express concerns over the possi
Suspected Russia-based DNC hackers strike again targeting Washington think tanks
International Business Times / Posted 7 hours ago
think tanks comes even as US security officials express concerns over the possibility of Russia attempting to influence the US elections via targeted cyberattacks, indicating that a cyberwar may indeed be brewing between the long-time rival nat... Read more
1d
AllAfrica.com
Iphone Malware That Steals Your Data Proves No Platform Is Truly Securethe intersection of human rights and security. Citizen Lab identified the link
Iphone Malware That Steals Your Data Proves No Platform Is Truly Secure
AllAfrica.com / Posted yesterday
the intersection of human rights and security. Citizen Lab identified the link as belonging to NSO Group, an Israel-based "cyberwar" company reportedly owned by American venture capital firm Francisco Partners Management, which sells spyware... Read more
109 related stories
1d
Newsweek
How Vladimir Putin is using Donald Trump to advance Russia's goalshacks of French TV and the 2014 meltdown of a German steel foundry after malwar
How Vladimir Putin is using Donald Trump to advance Russia's goals
Newsweek / Posted yesterday
hacks of French TV and the 2014 meltdown of a German steel foundry after malware infected its systems, an attack known in cyberwar circles by the chilling clinical term “cyber-to-physical effect.” The DNC hack, then, was just one of several “very... Read more
1d
International Business Times
Australian defence and government networks breached by suspected Chinese state-sponsored hackersformer IT manager Daryl Peter said. However, these attacks appear to be only t
Australian defence and government networks breached by suspected Chinese state-sponsored hackers
International Business Times / Posted yesterday
former IT manager Daryl Peter said. However, these attacks appear to be only the tip of the iceberg in relation to the cyberwar mounted by hackers against the Australian government and businesses. According to the Australian prime minister's... Read more
2 related stories
3d
TechNewsWorld.com
Apple Speeds iOS Patch to Bring Down Pegasussent to Mansoor. The messages included links to an exploit infrastructure conn
Apple Speeds iOS Patch to Bring Down Pegasus
TechNewsWorld.com / Posted 3 days ago
sent to Mansoor. The messages included links to an exploit infrastructure connected with NSO Group, an Israel-based cyberwar company that sells the spyware product Pegasus exclusively to governments, according to Citizen Lab. The NSO Group,... Read more
109 related stories
3d
Mashable
iPhone malware that steals your data proves no platform is truly secureand starts snoop on all your iPhone's data. Citizen Lab identified the link as
iPhone malware that steals your data proves no platform is truly secure
Mashable / Posted 3 days ago
and starts snoop on all your iPhone's data. Citizen Lab identified the link as belonging to NSO Group, an Israel-based "cyberwar" company reportedly owned by American venture capital firm Francisco Partners Management, which sells spyware... Read more
109 related stories
4d
Boston Herald
Apple troubleshoots hack of ubiquitous iOSin Apple’s iOS operating system to let hackers gain complete control of mobile
Apple troubleshoots hack of ubiquitous iOS
Boston Herald / Posted 4 days ago
in Apple’s iOS operating system to let hackers gain complete control of mobile devices. Citizen Lab identified Israeli “cyberwar” company NSO Group, which helps governments spy on mobile phones, as creator of the government-exclusive, “lawful... Read more
109 related stories
4d
The Register NorthJersey.com
Apple issues security update to prevent iPhone spywareiOS using three zero-day vulnerabilities we call ‘Trident.’” Citizen Lab trace
Apple issues security update to prevent iPhone spyware
The Register NorthJersey.com / Posted 4 days ago
iOS using three zero-day vulnerabilities we call ‘Trident.’” Citizen Lab traced the link to NSO Group, which it calls a “cyberwar” company in Israel that sells a spyware product called Pegasus, said John Scott-Railton, one of the Citizen Lab... Read more
130 related stories
7d
FOX Business
Lockheed Shrinks, and a New Cyberwar Star Is Born at LeidosTwice as big as before, Leidos can fight a cyberwar -- and a whole lot more. Im
Lockheed Shrinks, and a New Cyberwar Star Is Born at Leidos
FOX Business / Posted 7 days ago
Twice as big as before, Leidos can fight a cyberwar -- and a whole lot more. Image source: Getty Images. And to complete the company's doubling down on its military hardware business, this week Lockheed finalized the sale of its IT division to... Read more
7d
FOX Business
Lockheed Shrinks, and a New Cyberwar Star Is Born at LeidosTwice as big as before, Leidos can fight a cyberwar -- and a whole lot more. Im
Lockheed Shrinks, and a New Cyberwar Star Is Born at Leidos
FOX Business / Posted 7 days ago
Twice as big as before, Leidos can fight a cyberwar -- and a whole lot more. Image source: Getty Images. Continue Reading Below And to complete the company's doubling down on its military hardware business, this week Lockheed finalized the sale of... Read more
10d
The Berkeley Daily Planet
Lo and Behold: Will the Internet Save Us or Destroy US?. Categoryare easy to find: The growth of the Dark Web, the spread of electronic organize
Lo and Behold: Will the Internet Save Us or Destroy US?. Category
The Berkeley Daily Planet / Posted 10 days ago
are easy to find: The growth of the Dark Web, the spread of electronic organized criminal activity, the creation of cyberwar tools designed to attack critical networks in other countries, and the hacking of supposedly "protected" data... Read more
2 related stories
12d
International Business Times
The Clinton Foundation fear donation data stolen after suspected hackinto the hacks, and as speculation swirls about the likelihood of Russian invol
The Clinton Foundation fear donation data stolen after suspected hack
International Business Times / Posted 12 days ago
into the hacks, and as speculation swirls about the likelihood of Russian involvement in the leak of NSA cyberweapons, it's becoming increasingly clear that 'cyberwar' is no longer taking place solely in the shadows. In 2016, it's front-pag... Read more
14 related stories
14d
Stamford Advocate
This is the future of warand change information. And all of them are happening right now, but not at a s
This is the future of war
Stamford Advocate / Posted 14 days ago
and change information. And all of them are happening right now, but not at a scale large enough to consider it a global cyberwar. "That's what any future cyber conflict is going to involve," Singer said. "A mix of these things." For example,... Read more
3 related stories
14d
Connecticut Post
This is the future of warand change information. And all of them are happening right now, but not at a s
This is the future of war
Connecticut Post / Posted 14 days ago
and change information. And all of them are happening right now, but not at a scale large enough to consider it a global cyberwar. "That's what any future cyber conflict is going to involve," Singer said. "A mix of these things." For example,... Read more
3 related stories
14d
San Francisco Chronicle
This is the future of warand change information. And all of them are happening right now, but not at a s
This is the future of war
San Francisco Chronicle / Posted 14 days ago
and change information. And all of them are happening right now, but not at a scale large enough to consider it a global cyberwar. "That's what any future cyber conflict is going to involve," Singer said. "A mix of these things." For example,... Read more
3 related stories
14d
Business Insider
The next world war is going to be fueled by state-sponsored hackingand change information. And all of them are happening right now, but not at a s
The next world war is going to be fueled by state-sponsored hacking
Business Insider / Posted 14 days ago
and change information. And all of them are happening right now, but not at a scale large enough to consider it a global cyberwar. "That's what any future cyber conflict is going to involve," Singer said. "A mix of these things." For example,... Read more
3 related stories
15d
Zero Hedge
Democrats Brace For More Leaks As Pelosi Changes Cell Number After Barrage Of "Obscene, Sick Calls"in an interview Sunday. “It’s an act of hostility by a foreign power.” It is u
Democrats Brace For More Leaks As Pelosi Changes Cell Number After Barrage Of "Obscene, Sick Calls"
Zero Hedge / Posted 15 days ago
in an interview Sunday. “It’s an act of hostility by a foreign power.” It is unclear just how a potential case of cyberwar would escalate if indeed the US launches a formal retaliation against Moscow. Just 24 hours after the democratic... Read more
152 related stories
15d
Orange County Register
Upload Cyber Commandcaliphate, led military planners to pursue unconventional forms of conflict at
Upload Cyber Command
Orange County Register / Posted 15 days ago
caliphate, led military planners to pursue unconventional forms of conflict at a distance, including new forms of cyberwarfare. Now U.S. officials have cleared the way for the White House to approve elevating Cyber Command to the highest... Read more
16d
Fortune
How Alex Gibney Made the Most Chilling Documentary Film of the YearEarlier this summer, Alex Gibney released Zero Days, a documentary about cyberw
How Alex Gibney Made the Most Chilling Documentary Film of the Year
Fortune / Posted 16 days ago
Earlier this summer, Alex Gibney released Zero Days, a documentary about cyberwar. The prolific filmmaker who brought you Going Clear (on Scientology), The Smartest Guys in the Room (the downfall of Enron), Steve Jobs (well, Steve Jobs), turned his... Read more
16d
ExtremeTech
Cyber is the new nuclear, changing the world through mutually assured disruptionout in a recent Politico article, “these attacks do not live up to the visions
Cyber is the new nuclear, changing the world through mutually assured disruption
ExtremeTech / Posted 16 days ago
out in a recent Politico article, “these attacks do not live up to the visions of doom and mass hysteria described in many cyberwar scenarios”. So how is cyber conflict living up to its reputation for being revolutionary? First and foremost, it’s... Read more
20d
Naked Capitalism
Michael Hudson: Clinton's Red-Baiting Distracts from Failure to Address Inequality, War-Mongering as Trump Flailsthe DNC’s dirty tricks toward Bernie’s followers. Then Assange did an Internet
Michael Hudson: Clinton's Red-Baiting Distracts from Failure to Address Inequality, War-Mongering as Trump Flails
Naked Capitalism / Posted 20 days ago
the DNC’s dirty tricks toward Bernie’s followers. Then Assange did an Internet interview and implied that it was not a cyberwar attack but a leak – indicating that it came from an insider inn the DNC. If this is true, then the Democrats are... Read more
20d
CNBC
Donald Trump is like a real-life Manchurian candidatethe Democratic National Convention were originally obtained through espionage b
Donald Trump is like a real-life Manchurian candidate
CNBC / Posted 20 days ago
the Democratic National Convention were originally obtained through espionage by Russian intelligence services engaging in cyberwar against America, and then shared with WikiLeaks by Russian sources engaged in an infowar against America. Do... Read more
20d
The Hill
Brent Budowsky: Donald Trump, a real-life Manchurian candidatethe Democratic National Convention were originally obtained through espionage b
Brent Budowsky: Donald Trump, a real-life Manchurian candidate
The Hill / Posted 20 days ago
the Democratic National Convention were originally obtained through espionage by Russian intelligence services engaging in cyberwar against America, and then shared with WikiLeaks by Russian sources engaged in an infowar against America. Do... Read more
21d
MPNnow.com
What's up with that?: No jailbreak, but squirrels pose problems, anywayat the furry fiends for such mischief.Citing Peter W. Singer, one of two writer
What's up with that?: No jailbreak, but squirrels pose problems, anyway
MPNnow.com / Posted 21 days ago
at the furry fiends for such mischief.Citing Peter W. Singer, one of two writers of a 2014 report on cybersecurity and cyberwar, the think tank said squirrels have taken down the power grid more times than terrorists — and that latter number is... Read more
24d
ExtremeTech
How to get started with DIY home alarm and security systemsout that a sensor wasn’t working by having someone break in. In time for Black
How to get started with DIY home alarm and security systems
ExtremeTech / Posted 24 days ago
out that a sensor wasn’t working by having someone break in. In time for Black Hat and DEFCON, we’re covering security, cyberwar, and online crime all this week; check out the rest of our Security Week stories for more in-depth coverage. Tagged... Read more
25d
MLive.com
'Hunt for the Wilderpeople' makes a triumphant return to Michigan Theateropens Friday at the Michigan.Special Screenings Downtown Zero Days is a docume
'Hunt for the Wilderpeople' makes a triumphant return to Michigan Theater
MLive.com / Posted 25 days ago
opens Friday at the Michigan.Special Screenings Downtown Zero Days is a documentary thriller about the world of cyberwar. For the first time, the film tells the complete story of Stuxnet, a piece of self-replicating computer malware... Read more
25d
ExtremeTech
Hacking US infrastructure: How vulnerable is it?Ukraine grid took longer to return. Russia is suspected to be behind that attac
Hacking US infrastructure: How vulnerable is it?
ExtremeTech / Posted 25 days ago
Ukraine grid took longer to return. Russia is suspected to be behind that attack, given the tensions in the region, but the cyberwarfare world has both state and non-state actors. Russia, China, Israel, Iran, North Korea, and the US all have cyber... Read more
25d
KERA North Texas
Despite Email Debacle, Prominent Cybersecurity Leaders Favor Clintonback against an adversary who's not actually the adversary; Hackers can spoof l
Despite Email Debacle, Prominent Cybersecurity Leaders Favor Clinton
KERA North Texas / Posted 25 days ago
back against an adversary who's not actually the adversary; Hackers can spoof locations. Roland Lindsey has a different cyberwar question: "What is the administration going to do to ensure that we actually have good talent fighting the cyberwar,... Read more
25d
Reuters
The world's best cyber army doesn’t belong to Russiaeven its closest allies. The United States is, by far, the world’s most aggres
The world's best cyber army doesn’t belong to Russia
Reuters / Posted 25 days ago
even its closest allies. The United States is, by far, the world’s most aggressive nation when it comes to cyberspying and cyberwarfare. The National Security Agency has been eavesdropping on foreign cities, politicians, elections and entire... Read more
25d
ExtremeTech
When you look at the camera and it looks back: How artificial intelligence is revolutionizing home securitymay be as scary to many people as it is comforting to others. In time for Blac
When you look at the camera and it looks back: How artificial intelligence is revolutionizing home security
ExtremeTech / Posted 25 days ago
may be as scary to many people as it is comforting to others. In time for Black Hat and DEFCON, we’re covering security, cyberwar, and online crime all this week; check out the rest of our Security Week stories for more in-depth coverage. Tagged... Read more
25d
KPBS San Diego
Despite Email Debacle, Prominent Cybersecurity Leaders Favor Clintonback against an adversary who's not actually the adversary; Hackers can spoof l
Despite Email Debacle, Prominent Cybersecurity Leaders Favor Clinton
KPBS San Diego / Posted 25 days ago
back against an adversary who's not actually the adversary; Hackers can spoof locations. Roland Lindsey has a different cyberwar question: "What is the administration going to do to ensure that we actually have good talent fighting the cyberwar,... Read more
25d
ExtremeTech
How to get started with DIY home surveillance systemsadministration yourself, as it minimizes your long-term costs. In time for Bla
How to get started with DIY home surveillance systems
ExtremeTech / Posted 25 days ago
administration yourself, as it minimizes your long-term costs. In time for Black Hat and DEFCON, we’re covering security, cyberwar, and crime all this week; check out the rest of our Security Week stories for more. And check out ourExtremeTech... Read more
26d
The Register
Smart TVs, satellites, and billboards all hacked in Ukrainian warblocking backup systems, with the possible use of a Cisco zero-day to gain cont
Smart TVs, satellites, and billboards all hacked in Ukrainian war
The Register / Posted 26 days ago
blocking backup systems, with the possible use of a Cisco zero-day to gain control of key systems. "There is no question cyberwar exists, but whether it rises to being a weapon of mass distraction isn’t certian,” he said. “It’s not decisive I... Read more
27d
ExtremeTech
How the US military is training machines to protect its digital assetsof what hackers call Capture the Flag. This is not the school yard game of yore
How the US military is training machines to protect its digital assets
ExtremeTech / Posted 27 days ago
of what hackers call Capture the Flag. This is not the school yard game of yore; rather it is a highly developed form of cyberwarfare in which the contestants try to reverse engineer the opponents operating system to expose flaws and steal a... Read more
28d
International Business Times
Yahoo probing potential data breach as 200 million user accounts appear on Dark Web usernames, hashed passwords and date of births appear to have been compromised.
Yahoo probing potential data breach as 200 million user accounts appear on Dark Web
International Business Times / Posted 28 days ago
usernames, hashed passwords and date of births appear to have been compromised. Read more on IBTimes UK Technology The cyberwar begins: US believed to 'hack back' at Russia following Democratic Party email leaks Russia's FSB spy service says... Read more
10 related stories
28d
Slate
The DNC Hack Shows How We’ve Dropped the Ball on Cyberdefenseagencies have hacked into other nations’ networks for longer still. (For detail
The DNC Hack Shows How We’ve Dropped the Ball on Cyberdefense
Slate / Posted 28 days ago
agencies have hacked into other nations’ networks for longer still. (For details on the surprisingly long history of cyberwar, click here.) And yet, when it comes to the most basic issues of strategy and policy, we’re all still wandering in... Read more
28d
Reuters
Podcast: What is Russia doing to influence the U.S. election?security, Peter W. Singer. Singer is a senior fellow at the New America Foundat
Podcast: What is Russia doing to influence the U.S. election?
Reuters / Posted 28 days ago
security, Peter W. Singer. Singer is a senior fellow at the New America Foundation and the author of Cybersecurity and Cyberwar: What Everyone Needs to Know. Singer walks us through Moscow’s information warfare strategy, tells us why North... Read more
28d
International Business Times
The cyberwar begins: US believed to 'hack back' at Russia following Democratic Party email leaks hack at the Democratic National Committee (DNC) by alleged Kremlin-linked group
The cyberwar begins: US believed to 'hack back' at Russia following Democratic Party email leaks
International Business Times / Posted 28 days ago
hack at the Democratic National Committee (DNC) by alleged Kremlin-linked groups threatens to turn the term 'cyberwar' from rhetoric into reality. Amid mounting evidence that at least two hacking groups – dubbed Cosy Bear and Fancy... Read more
2 related stories
30d
San Antonio Express-News
Answer to cyberattacks raises tough issueshave been a bit distracted at the time. While setting up his new administration
Answer to cyberattacks raises tough issues
San Antonio Express-News / Posted 30 days ago
have been a bit distracted at the time. While setting up his new administration, he was also learning the dark arts of cyberwar, descending into the Situation Room to oversee a complex American-Israeli offensive operation to disable Iran's... Read more
2 related stories
30d
Boston Globe
Questions loom over a response to cyberattackshave been a bit distracted at the time. While setting up his new administration
Questions loom over a response to cyberattacks
Boston Globe / Posted 30 days ago
have been a bit distracted at the time. While setting up his new administration, he was also learning the dark arts of cyberwar, descending into the Situation Room to oversee a complex American-Israeli offensive operation to disable Iran’s... Read more
2 related stories
30d
The Seattle Times
Spy vs. spy: the thorny question of how to respond to Russia cyberattackshave been a bit distracted at the time. While setting up his new administration
Spy vs. spy: the thorny question of how to respond to Russia cyberattacks
The Seattle Times / Posted 30 days ago
have been a bit distracted at the time. While setting up his new administration, he was also learning the dark arts of cyberwar, descending into the Situation Room to oversee a complex U.S.-Israeli offensive operation to disable Iran’s nuclear... Read more
2 related stories
30d
Zero Hedge
The Cyberwars Begin: NSA Hackers Target Russian Cyber Spies As Kremlin Says It Is Being Attackedfrom the inside as malicious actors conduct their operations in real time. So
The Cyberwars Begin: NSA Hackers Target Russian Cyber Spies As Kremlin Says It Is Being Attacked
Zero Hedge / Posted 30 days ago
from the inside as malicious actors conduct their operations in real time. So are the US and Russian now in a state of cyberwar? Rajesh De, former general counsel at the NSA, said that if the NSA is targeting the Russian groups, it could be... Read more
256 related stories
m
The Washington Times
Hillary Clinton’s bad tax planis left of the chronically weak Obama economy, Mr. Trump was urging his buddy,
Hillary Clinton’s bad tax plan
The Washington Times / Posted 1 months ago
is left of the chronically weak Obama economy, Mr. Trump was urging his buddy, Russian thug Vladimir Putin, to step up his cyberwar on the United States to find Hillary’s 30,000 deleted emails. Worse, Mr. Trump didn’t respond negatively when a... Read more
m
MLive.com
An exposé on competitive tickling, Woody Allen's latest, or the top doc from Sundance: What will you watch this weekend?plays Saturday July 30 through Monday August 1 at the Michigan. Zero Days is a
An exposé on competitive tickling, Woody Allen's latest, or the top doc from Sundance: What will you watch this weekend?
MLive.com / Posted 1 months ago
plays Saturday July 30 through Monday August 1 at the Michigan. Zero Days is a documentary thriller about the world of cyberwar. For the first time, the film tells the complete story of Stuxnet, a piece of self-replicating computer malware... Read more
m
KESQ Palm Springs
Was Clinton a good secretary of state?political adversaries. This explains why -- while security professionals worry
Was Clinton a good secretary of state?
KESQ Palm Springs / Posted 1 months ago
political adversaries. This explains why -- while security professionals worry about Russia, China, nuclear weapons and cyberwar -- the GOP's convention devoted most of its national security programming to Benghazi and immigration. And senior... Read more
m
ABC 7 El Paso
Was Clinton a good secretary of state?political adversaries. This explains why -- while security professionals worry
Was Clinton a good secretary of state?
ABC 7 El Paso / Posted 1 months ago
political adversaries. This explains why -- while security professionals worry about Russia, China, nuclear weapons and cyberwar -- the GOP's convention devoted most of its national security programming to Benghazi and immigration. And senior... Read more

People in this news