Related topics: cyberattack

NATO networks vulnerable to cyber threat: US

NATO's military networks are not fully protected against cyber threats and the alliance must make good on a pledge to erect a virtual wall by 2012, a top US defence official said Tuesday.

Ellison: Oracle has $4 billion case against SAP

(AP) -- Oracle Corp. CEO Larry Ellison turned up the pressure in an industrial espionage trial Monday by testifying that archenemy SAP AG should have paid $4 billion for licenses to Oracle software.

Wiretapping Skype calls: virus eavesdrops on VoIP

(AP) -- Some computer viruses have a crude but scary ability to spy on people by logging every keystroke they type. Now hackers and potentially law enforcement have another weapon: a virus that can eavesdrop on voice conversations ...

US senators call for cybersecurity czar

Two US senators introduced legislation on Wednesday aimed at creating a powerful national cybersecurity advisor who would report directly to the president.

Is that new doll spying on your kids?

What if strangers are using one of your child's toys to spy on them? In the new world of connected toys, truth can be spookier than fiction.

False clues make it tough to find WADA hackers

Medical data from some of the world's leading athletes has been posted to the web and the World Anti-Doping Agency says Russians are to blame. Even the hackers seem to agree, adopting the name "Fancy Bears"—a moniker long ...

WikiLeaks says NSA spied on French business

WikiLeaks has released documents that it says show that the U.S. National Security Agency eavesdropped on France's top finance officials and high-stakes French export bids over a decade in what the group called targeted economic ...

Dynamic encryption keeps secrets

Professor Lars Ramkilde Knudsen from DTU Compute has invented a new way to encrypt telephone conversations that makes it very difficult to 'eavesdrop'. His invention can help to curb industrial espionage.

No chance for industrial pirates

In the future, production facilities will be able to communicate and interact with one another, and machinery will often be remote-serviced. But no company boss wants to run the risk of opening the door to industrial espionage ...

page 2 from 9