Please turn on your JavaScript for this page to function normally.
Point-and-shoot weapon stops drones without destroying them

Unmanned aerial vehicles – so-called drones – can be helpful, malicious, or simply disruptive, depending on the intentions of those who use them.But while regular …

UK, US law enforcement agencies disrupt Dridex botnet

The UK’s National Crime Agency is spearheading an onslaught against the Dridex (aka Bugat, aka Cridex) banking malware and the criminals that wield it.“Dridex …

The countdown to the EU Data Protection Regulation

The scope of the changes under the proposed shift to a single EU Data Protection Regulation, means that organisations should be doing the groundwork now to ensure they’re not …

Cybersecurity expectations: Myth and reality

Millennials in the U.S. and U.K. have almost entirely lost trust in government and business to protect their personal information online, according to Intercede.The number of …

Chinese hackers arrested at US request

Late last month, China’s president Xi Jinping made a state visit to the US and it resulted, among other things, in an agreement that the US and China will provide each …

Former journalist faces 25 years in prison for article defacement

Matthew Keys, a former Reuters social media editor, has been found guilty of computer hacking, and could be sentenced to spend as many as 25 years in prison.Keys was indicted …

The number of fingerprints stolen in OPM hack rose to 5.6 million

Once again, the scope of the breach at the US Office of Personnel Management has been amended: OPM’s press secretary Sam Schumach announced on Wednesday that “of …

NIST will award $3.6 million to projects designed to improve cybersecurity

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) will award $3.6 million for three pilot projects designed to make online …

Will the 2016 US presidential campaign get hacked?

As the 2016 presidential race heats up, Wakefield Research examined American perceptions of the threat of political hacking, and which of the leading U.S. presidential …

63% in favor of encryption backdoors to respond to national security threats

Vormetric did a survey on how Americans view “backdoor” access by government entities to the encrypted data of private businesses. Ninety-one percent recognized …

Risky mobile behaviors are prevalent in the government

Mobile devices are extremely prevalent in federal agencies, even within those that purport to have policies prohibiting the use of them. Lookout analyzed 20 federal agencies …

Pentagon’s unclassified email system breached, Russian hackers blamed

Pentagon’s Joint Staff unclassified email system, used by 4,000 military and civilian personnel, has been compromised by attackers, and it has been taken offline until …

Don't miss

Cybersecurity news