June 2014:
6/24/14
Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones
6/22/14
Hedge-Fund Hack Is Part of Bigger Siege, Cyber-Experts Warn
6/17/14
Shortage of Cybersecurity Professionals Poses Risk to National Security
6/17/14
Report: Chinese phone comes preloaded with spyware
6/16/14
How ISIS Games Twitter
6/16/2014
Hackers ransom Domino’s customer data (including favourite toppings) for €30,000
6/11/2014
Cyber terrorism: Danger of strategic attacks increasing
6/11/2014
Hagel authorized release of cyber warfare plans to China
6/10/2014
Chinese wireless gear in South Korea telecom network boosts cyber attack threat for U.S. troops
6/10/2014
The Emerging Science of Computational Anthropology
6/10/2014
US national agency computers misused to mine bitcoins
6/9/2014
14-Year-Old Kids “Hack” Into ATM Using Default Security Code
6/8/2014
Computer passes ‘Turing Test’ for the first time after convincing users it is human
6/7/2014
How Bitcoin Helps Afghan Girls Achieve Financial Freedom
6/5/2014
PayPal Getting Bitcoin? eBay CEO Says Digital Currency Integration Coming ‘Very Soon’
6/3/2014
How Bitcoin could become a super-sized Wayback Machine
6/3/2014
Is hacking the future of finance?
6/2/2014
U.S. indicts notorious Russian hacker
May 2014
5/29/2014
We Just Got 100 Million Times Better at Teleporting Data
5/29/2014
Rush a Light Wave and You’ll Break Its Data, say NIST Scientists
5/28/2014
SENATE DEFENSE BILL UNEARTHS NSA ‘SHARKSEER’ PROGRAM
5/27/2014
Privacy under attack: the NSA files revealed new threats to democracy
5/27/2014
The High-Tech—and Very Low-Tech—Tactics of Corporate Espionage
5/26/2014
Congress divorces NIST and NSA
5/23/2014
Sophisticated Google Drive Phishing Scam is becoming popular
5/23/2014
Darpa Turns Oculus Into a Weapon for Cyberwar
5/23/2014
No New Cybersecurity Regs Coming from Feds
5/23/2014
Robert Gates: Most Countries Conduct Economic Espionage
5/21/2014
Ebay user database breached, requiring password reset
5/20/2014
Comey: FBI ‘Grappling’ With Hiring Policy Concerning Marijuana
5/20/2014
U.S. utility’s control system was hacked, says Homeland Security
5/19/2014
5 in China Army Face U.S. Charges of Cyberattacks
5/19/2014
Caught Red-Handed
5/19/2014
U.S. accuses China of cyber spying on American companies
5/19/2014
US charges Chinese cyberespionage operators, inspiring retaliatory actions
5/19/2014
NIST launches external review in wake of NSA scandal
5/17/2014
FBI Wary Of Possible Russian Spies Lurking In U.S. Tech Sector
5/15/2014
How the Elderwood Platform is Fueling 2014’s Zero-Day Attacks
5/15/2014
Anti-gangster law invoked to score stiff sentence against two-bit cyberthief
5/14/2014
US Navy funds morality lessons for robots
5/14/2014
$10 Of Free Bitcoin For College Students
5/13/2014
Iranian Hackers Targeted Defense Workers and Political Dissidents
5/13/2014
Iranian Hackers Target US Defense Contractors
5/12/2014
DHS: Watch out for Introverts, Egotists, Passive Aggressive Colleagues
5/12/2014
Can big data predict the next cyber attack?
5/11/2014
Ex-FBI official: Intel agencies don’t share cyber threats that endanger companies
5/9/2014
Tor Is Being Used as a Safe Haven for Victims of Cyberstalking
5/8/2014
How Al-Qaeda Uses Encryption Post-Snowden (Part 1)
5/5/2014
New Chinese Supercomputer Goes Beta (Tianhe 2 Ahead Of Schedule And On Budget)
5/3/2014
As NSA builds arsenal, funding for cybermilitary goes up
5/2/2014
Be aware, Apple iOS Data protection doesn’t protect email attachments
5/1/2014
White House big-data panel wants privacy protections, ignores NSA debate
5/1/2014
“Operation Clandestine Fox” Now Attacking Windows XP Using Recently Discovered IE Vulnerability
April 2014
4/30/2014
US State Department adopting social media to counter Al-Qaeda propaganda
4/30/2014
Senate Cybersecurity Bill in the Works
4/30/2014
Bitcoin 101: Experiment Will Give MIT Undergrads $100 of Cryptocurrency
4/29/2014
Tracking the Clandestine Fox
4/29/2014
Report: Cyber Spying Bug, Attack Plans Found in Lithuania
4/28/2014
Exclusive: Meet the Fed’s First Line of Defense Against Cyber Attacks
4/27/2014
Cyber firms look to move the electrical grid
4/26/2014
How One Woman Hid Her Pregnancy From Big Data
4/24/2014
Taking Down the Underground Economy
4/24/2014
Inside the ‘DarkMarket’ Prototype, a Silk Road the FBI Can Never Seize
4/24/2014
Before Silicon Valley got nasty, the Pirates of Analog Alley fought it out
4/24/2014
The Blue Screen of Death at 30,000 Feet
4/22/2014
Maybe I’ll go to Hell, but I think it’s a good thing’ says plastic Liberator gunsmith Cody Wilson
4/22/2014
Keeping the NSA in Perspective
4/22/2014
China plays ‘victim’ of global cyber attacks
4/21/2014
Heartbleed as Metaphor
4/21/2014
“Unflod Baby Panda” Exploit Targets Jailbroken Iphones
4/21/2014
Four of the newest (and lowest) Social Engineering scams
4/21/2014
Unflod Baby Panda” Exploit Targets Jailbroken Iphones
4/20/2014
U.S. Promotes Network to Foil Digital Spying
4/19/2014
Unflod Baby Panda, the Chinese malware hit jailbroken iphone
4/17/2014
Phishing boom in China bucks global trends
4/17/2014
Satellite Communication (SATCOM) Devices Vulnerable to Hackers
4/17/2014
New ‘Google’ for the Dark Web Makes Buying Dope and Guns Easy
4/15/2014
The U.S. Government Wants 6,000 New ‘Cyberwarriors’ by 2016
4/15/2014
Crimeware or APT? Malware’s “Fifty Shades of Grey”
4/15/2014
The security of the most popular programming languages
4/15/2014
The US Government wants 6000 new “Cyberwarriors” by 2016
4/14/2014
How to Detect Criminal Gangs Using Mobile Phone Data
4/14/2014
The Major Cyber Events You Might Have Missed
4/13/2014
China’s defense chief mentions military cyber war program for first time
4/13/2014
Obama lets NSA use zero-day flaws given “clear national security” need
4/12/2014
Private crypto keys are accessible to Heartbleed hackers, new data shows
4/11/2014
Why Every Website Should Use Always On SSL (AOSSL)
4/11/2014
NSA Said to Exploit Heartbleed Bug for Intelligence for Years
4/10/2014
Heartbleed Bug
4/10/2014
Heartbleed Bug hits at heart of many Cisco, Juniper products
4/10/2014
Building A Raspberry Pi VPN Part One: How And Why To Build A Server
4/9/2014
How Heartbleed Works: The Code Behind the Internet’s Security Nightmare
4/8/2014
Experts Find a Door Ajar in an Internet Security Method Thought Safe
4/7/2014
Hackers Lurking in Vents and Soda Machines
4/7/2014
REPORT: Russian Cyber Crime Syndicate Linked To Neiman Marcus Theft
4/4/2014
How the Internet Is Taking Away America’s Religion
4/3/2014
One of World’s Largest Websites Hacked: Turns Visitors into “DDoS Zombies”
4/3/2014
Unbreakable’ security codes inspired by nature
4/2/2014
Windows XPocalypse and the Spread of ATM Malware
4/2/2014
UK Launches First National CERT
4/1/2014
Wickr Spreads Its ‘Leave No Trace’ Messaging
March 2014
3/31/2014
Popular Remote access Trojan njRAT fuels Middle East Cyber Crime
3/31/2014
Study Shows Flawed U.S. Encryption Standard Could Be Broken in Seconds
3/29/2014
White House cyber chief: future cyber attack to wipe out critical infrastructure
3/28/2014
U.S. cyberwarfare force to grow significantly, defense secretary says
3/28/2014
Big data: are we making a big mistake?
3/27/2014
Why Congress Can’t Pass Cyber Law
3/27/2014
Stoners Now Have Their Own Cryptocurrency: PotCoin
3/27/2014
Young MIT researcher develops NSA-proof encryption service
3/25/2014
Hackers Breached Israeli Defence Forum, gathered info, sent threatening SMS to Israeli journalists
3/24/2014
Zero-day vulnerability in Microsoft Word under active attack
3/24/2014
Malicious apps can hose Android phones, erase data, researchers warn
3/23/2014
Hacked Emails Show How Much Microsoft Charges FBI for Selling Your Personal Data
3/22/2014
Turkish Finance Minister Simsek defends Twitter ban
3/22/2014
N.S.A. Breached Chinese Servers Seen as Security Threat
3/21/2014
Meet SSNDOB: Online Identity Theft Store lead by Cyclosa Gang
3/20/2014
Hackers develop drone that can steal the info on your phone
3/19/2014
Making Their Mark: How Women Are Finding their Place in the Field of Cybersecurity
3/19/2014
A Few Thoughts on Cryptographic Engineering
3/18/2014
Flight 370 ‘Cyber Hijack’ Theory Emerges
3/17/2014
Navigating the Cyber Threat Landscape: Overview and Forecast
3/16/2014
NATO websites hit in cyber attack linked to Crimea tension
3/16/2014
Cyber attacks in Europe highlight the new face of modern warfare
3/15/2014
LightOut is Latest Cyber Threat to Target Energy Sector
3/14/2014
Syrian Electronic Army hacks U.S Central Command & threatens to leak Secret Documents
3/12/2014
How the NSA Plans to Infect ‘Millions’ of Computers with Malware
3/12/2014
Happy Birthday World Wide Web
3/11/2014
Site lets people search satellite images for lost Malaysian plane
3/8/2014
Suspicion Falls on Russia as ‘Snake’ Cyberattacks Target Ukraine’s Government
3/8/2014
Ukraine suffers new cyber attacks
3/7/2014
The Russia-Ukraine Cyber Front Takes Shape
3/6/2014
The Face Behind Bitcoin
3/5/2014
Jail Sentence in France Over ‘Cyber Jihad’
3/4/2014
Cyber battle apparently under way in Russia-Ukraine conflict
3/4/2014
The Doomsday Cult of Bitcoin
3/4/2014
Watching for a Crimean Cyberwar Crisis
3/4/2014
Uroburos Rootkit: Most sophisticated 3-year-old Russian Cyber Espionage Campaign
3/3/2014
Is This Russia’s Stuxnet? Security Firm Spots Suspicious ‘Uroburos’ Rootkit
3/1/2014
Foreign Affairs: Networking Nature
3/1/2014
Foreign Affairs: The Mobile Finance Revolution
3/1/2014
Foreign Affairs: The Key to Successful Tech Management
February 2014
2/28/2014
Bitcoin Derivatives Sprout as Regulators Play Catch-Up
2/27/2014
Thieves Break Into Cars Using Mysterious ‘Black Box’
2/27/2014
Apple Explains Exactly How Secure iMessage Really Is
2/25/2014
Why Telegram has become the hottest messaging app in the world
2/24/2014
Q&A With a Deep Web Arms Dealer
2/24/2014
New attack completely bypasses Microsoft zero-day protection app
2/24/2014
The HP Security Research group details Iranian cyber capabilities
2/24/2014
Hagel says defense shifting from counterterrorism to battling cyber attacks from China
2/20/2014
Released a Metasploit module to hack 70% Android devices
2/18/2014
Iranian Hacking to Test NSA Nominee Michael Rogers
2/18/2014
Detected new Zeus variant which makes use of steganography
2/18/2014
Forget China: Iran’s Hackers Are America’s Newest Cyber Threat
2/17/2014
Dear Asus router user: You’ve been pwned, thanks to easily exploited flaw
2/17/2014
Russian cybercrooks shun real currencies, develop private altcoins
2/17/2014
Mapping Hacking Team’s “Untraceable” Spyware
2/13/2014
OK, Mr. President, those cybersecurity guidelines you ordered are HERE
2/13/2014
Magento vulnerability allows an attacker to create administrative user
2/13/2014
Prepare for cyber war, Iran’s supreme leader tells students
2/12/2014
How Big Data Could Help the U.S. Predict the Next Snowden
2/10/2014
Meet Mask, possibly the most sophisticated malware campaign ever seen
2/10/2014
Researchers uncover cyber spying campaign dubbed ‘The Mask’
2/9/2014
CAN Hacking Tools, 20 USD to hack a car remotely
2/8/2014
Inside the world’s first-ever Dogecoin party
2/6/2014
Bitcoins cannot be used in Russia – Prosecutor General’s Office
2/6/2014
Army Units in Afghanistan Slam Intel System
2/5/2014
NullCrew FTS hacks Comcast servers, post exploit and passwords
2/3/2014
A Hacker Found GPS Data in the Audio of This Police Chase Video
2/3/2014
Cryptography Breakthrough Could Make Software Unhackable
2/3/2014
Law Library of Congress releases report on Bitcoin’s legal status around the world
January 2014
1/28/2014
Slang Used in the Russian Underground
1/27/2014
DEVELOPING YOUR CYBER INTELLIGENCE ANALYST SKILLS
1/26/2014
Spear Phishing Attack Was Used in CNN Blogs Hack
1/25/2014
Cyber Command doubles budget in $1.1 trillion funding bill as U.S. gears up for cyber warfare
1/24/2014
The True Forever War
1/24/2014
Lessons from the World’s Most Tech-Savvy Government
1/24/2014
A million Neiman customer cards hit
1/22/2014
Sefnit botnet-Microsoft has silently uprooted Tor Browser from more than 2 Million PC
1/22/2014
Russia hacked hundreds of Western, Asian companies: security firm
1/22/2014
Modems, wArEz, and ANSI art: Remembering BBS life at 2400bps
1/21/2014
US Budget Identifies China as ‘Cyber Threat’
1/16/2014
Ivory Coast cracks down on cyber crime
1/16/2014
AN INTRODUCTION TO CYBER INTELLIGENCE
1/15/2014
Cult of the Cyber Offensive
1/15/2014
Silent Circle & Geeksphone Join Forces To Build Blackphone: A Pro-Privacy Android-Based Smartphone
1/15/2014
We Hacked North Korea With Balloons and USB Drives
1/14/2014
N.S.A. Devises Radio Pathway Into Computers
1/14/2014
Three Must Watch Videos to Understand Why Bitcoin is Disruptive
1/10/2014
How data are HACKED and how you can keep yours SAFE, in one chart
1/10/2014
How Scared Should You Be of a Cyberwar?
1/8/2014
What It’s Like When The FBI Asks You To Backdoor Your Software
1/2/2014
Snapchat Breach Exposes Weak Security
December 2013
12/30/2013
Don’t Want Your Laptop Tampered With? Just Add Glitter Nail Polish
12/28/2013
A few more notes on NSA random number generators
12/19/2013
The sound made by your computer could give away your encryption keys…
12/18/2013
NSA review panel findings: Liberty and Security in a Changing World – read the full report
12/15/2013
Self-censorship – Facebook monitors everything users type and not publish
12/11/2013
NASA’s Valkyrie robot is a 6-foot ‘superhero’ designed to save you from disasters
12/11/2013
Play This Harmless-Looking Web Game, and You’re Helping the Pentagon
12/6/2013
Hour of Code Offers Coding Tutorials from Bill Gates, Zuckerberg, Etc
12/5/2013
Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet
12/4/2013
Stolen Facebook and Yahoo passwords dumped online
12/3/2013
Kaspersky Security Bulletin 2013. Malware Evolution
12/3/2013
Flying hacker contraption hunts other drones, turns them into zombies
12/2/2013
Scientist-developed malware prototype covertly jumps air gaps using inaudible sound
12/2/2013
Is the Future of the Internet in Iceland?
12/1/2013
The Insidiousness of Facebook Messenger’s Mobile App Terms of Service
November 2013
11/27/2013
It’s Time to Write the Rules of Cyberwar
11/25/2013
The internet mystery that has the world baffled
11/23/2013
Hacking Google Gmail accounts exploiting password reset system flaw
11/23/2013
Facebook vulnerability allows to view hidden Facebook Friend List
11/23/2013
NSA Document: Cyber attacks are asymmetric weapons and significant future threat to U.S.
11/23/2013
NSA infected 50,000 computer networks with malicious software
11/20/2013
Repeated attacks hijack huge chunks of Internet traffic, researchers warn
11/20/2013
Where do cyber-weapons come from? Try a cyber arms dealer
11/19/2013
How License-Plate Scanners Are Eroding Our Privacy
11/19/2013
FireEye Links Chinese Cyberattacks to Single Source
11/17/2013
Disruptions: A Digital Underworld Cloaked in Anonymity
11/17/2013
FBI warns that Anonymous Hackers has been hacking US Government for almost a year
11/14/2013
3 Malware Trends You Need to Know About
11/13/2013
MIT’s shapeshifting display lets you reach out and touch someone
11/13/2013
Stuxnet’s Secret Twin
11/12/2013
Navy, Marines to Analyze Pentagon’s Cloud Email System
11/11/2013
Stuxnet infected Russian nuke power plant – Kaspersky
11/8/2013
The Silk Road black market reloaded … 2.0 is out!
11/8/2013
Critical infrastructure not prepared for GPS disruption
11/6/2013
IG: Government Has No Digital Cyber Warning System
11/6/2013
VICEROY TIGER Delivers New Zero-Day Exploit
11/6/2013
Smartphones, A Perfect Cyber Espionage and Surveillance Weapon
11/6/2013
Mobile devices and cyber espionage, principal concerns for governments
11/5/2013
Have you seen these “cyber” fugitives? FBI offers up to $100,000 bounty
11/4/2013
Biohacker’ implants chip in arm
11/4/2013
MESSAGE SECURITY ‘UNCONDITIONALLY GUARANTEED’ AFTER QUANTUM CRYPTOGRAPHY BREAKTHROUGH
11/3/2013
Fake femme fatale dupes IT guys at US government agency
11/2/2013
Going Viral: How Two Pakistani Brothers Created the First PC Virus
11/2/2013
No Morsel Too Minuscule for All-Consuming N.S.A
October 2014
10/31/2013
#badBIOS features explained
10/31/2013
Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps
10/31/2013
Finland says government’s data network hit by severe hacking
10/30/2013
Russia Claims China Bugged Tea Kettles With Freaky WiFi-Exploiting Microchips
10/29/2013
Social media and digital identity. Prevention and incident response
10/23/2013
Irony of Ironies, Chinese Telecom Equipment Company Is Pushing Global Cybersecurity Standards
10/23/2013
Former NSA chief: NSA and U.S. Cyber Command are now ‘indistinguishable’
10/22/2013
Mapped: What Global Cyberwar Looks Like in Real Time
10/22/2013
They Spy on Us to Protect Us/How Dare They Spy on Us? The Pendulum Swings On
10/16/2013
How to Design — And Defend Against — The Perfect Security Backdoor
10/14/2013
Stealthy technique fingerprints smartphones by measuring users’ movements
10/11/2013
Air Gaps
10/10/2013
Ultrasound chip offers gesture control for mobiles
10/8/2013
How the Bible and YouTube are fueling the next frontier of password cracking
10/7/2013
Khaan Quest: Chinese Cyber Espionage Targeting Mongolia
10/4/2013
A Smartphone Charger That Sniffs for Malware
10/3/2013
How Snowden’s Email Provider Tried To Foil The FBI Using Tiny Font
September 2014
9/26/2013
Finding the best cyber innovations
9/25/2013
Icefog: The Hacker Crew Trying to Break Into Your Weapons
9/24/2013
How a Crypto ‘Backdoor’ Pitted the Tech World Against the NSA
9/23/2013
Anonymous in Context: The Politics and Power behind the Mask
9/17/2013
Intel’s Anthropologist Genevieve Bell Questions the Smart Watch
9/6/2013
On Backdoors and Encryption
9/5/2013
Follow The Bitcoins: How We Got Busted Buying Drugs On Silk Road’s Black Market
9/3/2013
Syrian Electronic Army revealed: Anonymous hacks SEA website, dumps data
July 2013
7/2/2013
Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance
7/2/2013
Infographic: Finding Big Benefits in Big Data
June 2013
6/14/2013
Secretive US cyber unit has been spying on China for 15 years
6/11/2013
Use With Caution: The Value and Limits of Deterrence Against Asymmetric Threats
May 2013
5/19/2013
North Korea may have secretly engineered computer games to launch mass cyber attack
5/8/2013
iPhone-Operated Digital Lock Makes House Keys a Thing of the Past
5/2/2013
No Clearance Required: Using Commercial Threat Intelligence in the Federal Space
5/1/2013
Google Glass security failings may threaten owner’s privacy
April 2013
4/22/2013
How to explain Bitcoin to your grandmother
3/12/2013
China hacker’s angst opens a window onto cyber-espionage
November 2012
11/12/2012
Stomping cognitive bias
11/7/2012
ME.GA HACKERS: WE’RE REAL PIRATES & WE’LL SELL DOTCOM’S DOMAIN TO UNIVERSAL
July 2012
7/19/2012
Taking the Cyberattack Threat Seriously
7/2/2012
When His Project Was Canceled, an Unemployed Programmer Kept Sneaking Into Apple to Finish the Job
June 2012
6/19/2012
Mapping and Monitoring Cyber Threats
February 2012
2/16/2012
How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did