Related topics: google · hackers · china · website · twitter

IBM taking US Air Force into software cloud

IBM said Thursday it has been enlisted by the US Air Force to show how defense and intelligence networks can safely soar into the online software "cloud."

An alert researcher, cooperation helped stem cyberattack

The cyberattack that spread malicious software around the world, shutting down networks at hospitals, banks and government agencies, was stemmed by a young British researcher and an inexpensive domain registration, with help ...

Web sites that can take a punch

The recent, well-publicized cyberattack on Google was just the latest skirmish in a long war. And like most long wars, this one features an arms race, as hackers seek out new security holes, and web site administrators try ...

Expert: Rural US websites easy target for hackers

(AP) -- The digital trove of credit card numbers and emails stolen by the group known as Anonymous came from towns across rural America - places like Gassville, Ark. and Tishomingo County, Miss., where officers don't usually ...

24,000 files stolen from defense contractor: Pentagon

A foreign intelligence service swiped 24,000 computer files from a US defense contractor in March in one of the largest ever cyberattacks on a Pentagon supplier, a top Defense Department official revealed on Thursday.

Japanese defense industry body target of cyberattack

A cyberattack was launched on an organization of Japanese defense contractors in an attempt to steal confidential information on the nation's defense industry, according to sources.

Egypt move revives US 'kill switch' debate

Egypt's five-day shutdown of the Internet has revived debate in the United States over how much authority the president should have over the Web in the event of a crisis.

page 1 from 25

Computer insecurity

Many current computer systems have only limited security precautions in place. This computer insecurity article describes the current battlefield of computer security exploits and defenses. Please see the computer security article for an alternative approach, based on security engineering principles.

This text uses material from Wikipedia, licensed under CC BY-SA