cyberwar articles over last 30 days

- articles last 30 days - articles per day
Mentioned in this news Places Companies People
2014/04/23 11:19
2014/04/23 11:19
3h
I put everything on my NAS, which has the Google Drive windows app installed. This allows me to slowly sync everything. Also, the files being uploaded are my backup, technically separate from my...
2014/04/23 11:19
2014/04/23 11:19
Latest videos
2014/04/21 17:05
2014/04/21 17:05
1d
Too Big to Jail?Why Kidnapping, Torture, Assassination, and Perjury Are No Longer Crimes in Washington By Tom Engelhardt How the mighty have fallen. Once known as "Obama's favorite general," James...
2014/04/21 13:05
2014/04/21 13:05
2d
The only crime that makes it to court is revealing the national security state's secrets. To stay on top of important articles like these, sign up to receive the latest updates from TomDispatch.com...
2014/04/16 18:09
2014/04/16 18:09
6d
The stealth weapon is a "scarlet letter", devised under Section 311 of the US Patriot Act. Once a bank is tainted in this way - accused of money-laundering or underwriting terrorist activities, a...
2014/04/14 16:05
2014/04/14 16:05
8d
Let me explain why writing the introduction to today's post by TomDispatch Managing Editor Nick Turse is such a problem. In these intros, I tend to riff off the ripples of news that regularly surround...
2014/04/14 12:46
2014/04/14 12:46
9d
The NSA may soon been unloading thousands of exploits due to new guidelines. Photo: AP The White House's directive to limit the use of software flaws by US intelligence agencies could require the...
2014/04/14 04:38
2014/04/14 04:38
9d
The Pell Center for International Relations and Public Policy at Salve Regina University will host “Cybersecurity and cyberwar: What Everyone Needs to Know” beginning at 7 p.m. at the Bazarsky Lecture...
2014/04/08 10:42
2014/04/08 10:42
15d
I cover the IT security industry for IT-Harvest. I am the author of Surviving cyberwar, a Government Institutes book available on Amazon. I have presented at conferences and industry events in 26...
2014/04/08 02:38
2014/04/08 02:38
15d
The Army�s academy has established a cyber warfare research institute to groom elite cyber troops and solve thorny problems for the Army and the nation in this new warfighting domain. The U.S. Army...
2014/04/04 23:20
2014/04/04 23:20
18d
Security professionals are playing defense against cybercrime, and often feel outgunned by tech-savvy hackers and insiders out to steal sensitive data from within the business. They see a shortage of...
2014/04/03 14:29
2014/04/03 14:29
20d
Hacking is no longer just a game for tech-savvy teens looking for bragging rights. It is a for-profit business -- a very big business. Yes, it is employed for corporate and political espionage,...
2014/03/27 13:38
2014/03/27 13:38
27d
China will take its security measures to the next level to protect against alleged US hacking, the government revealed on Thursday. Speaking to reporters on Thursday, Defense Ministry spokesman Geng...
2014/03/26 20:10
2014/03/26 20:10
27d
While Twitter rose to notoriety by being the place where people spilled the minutiae of their lives, there are times when its users don't want everyone in the online world to see what they're...
2014/03/25 00:27
2014/03/25 00:27
29d
Explanation sought by China on reports of US spying on Huawei Calcutta News.NetMonday 24th March, 2014BEIJING - China has sought explanation from Washington over media reports that the U.S. National...
2014/03/24 15:38
2014/03/24 15:38
29d
China isn't too pleased with the US over claims that it might have infiltrated Huawei's servers to spy on the country, a new report claims. Speaking to reporters in China on Monday, Hong Lei, a China...
2014/03/21 02:06
2014/03/21 02:06
m
On Tuesday morning, Edward Snowden materialized on a telepresence robot, beaming in to an auditorium in Canada from an undisclosed location in Russia. The former National Security Agency contractor...
2014/03/20 11:37
2014/03/20 11:37
m
Diagram of the underside of the U.S. E-18G Growler jet, showing its armaments; a modified F/A-18, the Growler uses electronic warfare in place of bombs and missiles. Los Angeles Times/MCT 2014 LOS...
2014/04/23 11:19
2014/04/23 11:19
Latest from Twitter