The software collaboration website GitHub said Monday it was fighting off a cyber attack since late last week, and security analysts said the effort appeared to originate in China.
The most realistic risks about the dangers of artificial intelligence are basic mistakes, breakdowns and cyber attacks, an expert in the field says – more so than machines that become super powerful, run amok and try to ...
Attackers hacking into American computer networks appear to be leaving "cyber fingerprints" to send a message that critical systems are vulnerable, the top US cyber-warrior said Thursday.
Britain's National Crime Agency says a suspected hacker has been arrested in connection with a cyber attack on the U.S. Department of Defense.
A steady stream of low-level cyber attacks poses the most likely danger to the United States rather than a potential digital "armageddon," US intelligence director James Clapper said on Thursday.
(AP)—The U.S. has elevated its appraisal of the cyber threat from Russia, the U.S. intelligence chief said Thursday, as he delivered the annual assessment by intelligence agencies of the top dangers facing the country.
The State Department faces thousands of cyber attacks every day, a top US official said Friday, refusing to confirm that hackers who breached their system in November were reportedly still lurking in the network.
A series of cyber attacks against Israel since mid-2013 appears to be coming from "Arab parties located in the Gaza Strip" and elsewhere, US security researchers say.
Technological advances are to explode 10 times faster than even the Internet boom in the 1990s, top tech tycoons told the global Davos elite Wednesday, but also warned that security threats would be worse this year than ever.
New technology that identifies users vulnerable to cyber attack based on behavioral and psychological characteristics
Fujitsu Limited and Fujitsu Laboratories Ltd. have announced the development of the industry's first technology for identifying users vulnerable to cyber attacks based on the ways they use their computers, such as their e-mail ...