Related topics: cyber attack

US spies not wanted at infamous hacker meet

Revelations about a US Internet surveillance program have chilled the relationship between federal authorities and an infamous Def Con hacker gathering.

Cyberwar manual lays down rules for online attacks (Update 3)

Even cyberwar has rules, and one group of experts is putting out a manual to prove it. Their handbook, due to be published later this week, applies the practice of international law to the world of electronic warfare in an ...

Hackers test, teach computer pros at Cyber Range

You won't find this town on a map, but it's a very scary place. In Alphaville, a virtual town used for cyber security training, the banks are robbed on a regular basis, the power plant and water system are under constant ...

Deals and ordeals for Chinese tech giant Huawei

Chinese telecom giant Huawei is perplexed at its treatment in the West, with the United States fearful it is a Trojan horse for cyber warfare even as Europe eagerly courts its business.

Ex-US general warns of growing cyber threat

A US adversary would currently be unable to bring down the entire US electrical grid using cyber weapons but such a scenario is conceivable within two to five years, the former vice chairman of the Joint Chiefs of Staff ...

Report: US cyber warfare needs oversight, debate

(AP) -- Shrouded in secrecy, the U.S. government's policies on how and when to wage cyber warfare are ill-formed, lack adequate oversight and require a broad public debate, a new report by the National Research Council says.

UK looks to young geeks to secure cyberspace

(AP) -- Britain is hiring former computer hackers to join a new security unit aimed at protecting cyberspace from foreign spies, thieves and terrorists, the country's terrorism minister said.

page 4 from 5