Related topics: google · hackers · china · website · twitter

Former US official to head cybersecurity at Sony

Japanese electronics giant Sony, which suffered a huge data breach this year, named a former top US Department of Homeland Security official on Tuesday to lead its cybersecurity efforts.

WikiLeaks site comes under attack

(AP) -- The WikiLeaks website crashed Tuesday in an apparent cyberattack after the accelerated publication of tens of thousands of once-secret State Department cables by the anti-secrecy organization raised new concerns ...

Expert: Rural US websites easy target for hackers

(AP) -- The digital trove of credit card numbers and emails stolen by the group known as Anonymous came from towns across rural America - places like Gassville, Ark. and Tishomingo County, Miss., where officers don't usually ...

IMF 'may never know' who mounted cyber attack

The International Monetary Fund said Friday it may be impossible to identify who mounted a cyber attack on its computer files in May, after a Bloomberg report suggested it was China.

Nation's fight against cyber intruders goes local

The next frontier in the fight to keep crucial electronic networks safe from harm will play out as close to home as Town Hall and require more involvement from private industry, which controls 85 percent of the infrastructure, ...

LulzSec hacks scandal-hit News International websites

Websites owned by Rupert Murdoch's News International were down Tuesday after the Lulz Security hacker group replaced The Sun's online version with a fake story pronouncing the mogul's death.

24,000 files stolen from defense contractor: Pentagon

A foreign intelligence service swiped 24,000 computer files from a US defense contractor in March in one of the largest ever cyberattacks on a Pentagon supplier, a top Defense Department official revealed on Thursday.

Pentagon to publish strategy for cyberspace wars

(AP) -- Facing escalating risks of cyberattacks by hackers, criminals and other nations, the Pentagon is developing more resilient computer networks so the military can continue to operate if critical systems are breached ...

page 18 from 25