Please turn on your JavaScript for this page to function normally.
Hearing on draconian new U.S. piracy legislation is under way

Today’s the day of the long awaited House Judiciary Committee’s hearing on the Stop Online Privacy Act (SOPA) and, as the Electronic Frontier Foundation claims, …

Trojan masquerading as PDF signed with stolen government certificate

Since the discovery of the Stuxnet worm, and especially after the recent string of certification authority compromises, cyber attackers’ practice of using digital …

FBI arrests six for DNS hijacking scam worth $14 million

Charges against six Estonian nationals and one Russian national for engaging in a massive and sophisticated Internet fraud scheme that infected with malware more than four …

DARPA invites white hats to help with U.S. cyber defense

The Defense Advanced Research Projects Agency (DARPA) is asking the government to ramp up its cyber research funding from $120 million to $208 million for 2012, and in the …

First joint EU-US cyber security exercise

The first joint cyber security exercise between the European Union and United States is being held today in Brussels, with the support of the EU’s Network and …

Hackers attacked U.S. government satellites

Two U.S. satellites have been tampered with by hackers – possibly Chinese ones – in 2007 and 2008, claims a soon-to-be released report by the the U.S.-China …

Japanese Parliament’s computers infected, data stolen

As the investigation into the breach of Mitsubishi Heavy Industries’ networks discovered last month continues, internal sources have confirmed that sensitive and …

Federal Trojan has more capabilities than previously thought

Ten days ago, the Chaos Computer Club made public a set of worrisome discoveries made by their analysis of the “lawful interception” Trojan used by German law …

U.S. DHS expects Anonymous to attack infrastructure

Anonymous is eyeing industrial control systems for future attacks, says the U.S. Department of Homeland Security, but its members have yet to demonstrate a capability to …

Hardened Android kernel to be used by U.S. Army, government

The U.S. government is looking at replacing radio communication between federal, state and local law enforcement and response agencies with communication with smartphones, and …

German states say “federal trojan” used within legal boundaries

The reaction following CCC’s claims that a government-made “lawful interception” Trojan has abilities that exceed those allowed by the nation’s …

U.S. military drones hit by computer virus

An unnamed virus with a “keylogger” payload has been found in the computers used to operate U.S. Air Force’s Predator and Reaper remotely operated drones. …

Don't miss

Cybersecurity news