List of Cyber Security & Hacking articles
-
The fictional Red October, while modified, would look quite similar to this Typhoon-class ballistic missile submarine. (Bellona Foundation via Wikimedia Commons) Fiction: We often use it to make the strange more familiar, as in spy novels
Spy novels introduce us to unusual or technical information, potentially confusing events, and unfamiliar social or professional customs.
-
On this episode of The E.R., the panel discusses SecureDrop. So You Want to Be a Leaker?
No method is foolproof, but some are better than others.
-
books_cover_10-2017 Apocalypse, Soon: New Books on War, Plague, Famine, Demagogues, and the End of the World as They Knew It
FP staffers learn what really killed the Romans and why the 1930s should scare us to death.
-
Does Kaspersky Have Something to Hide?
The Russian security giant faces scrutiny worldwide. Is there fire beneath the smoke?
-
Facebook CEO Mark Zuckerberg at the f8 Developer Conference in San Francisco, California. (Justin Sullivan/Getty Images) The Pro-Free Speech Way to Fight Fake News
Most cures for fraudulent news threaten to be worse than the disease. There’s at least one exception.
-
China's President Xi Jinping poses after delivering his speech at the UNESCO headquarters in Paris on March 27, 2014. After a day devoted to multi-billion-dollar business deals, Chinese leader Xi Jinping trained his sights on culture and history today on the last day of his lavish visit to France. AFP PHOTO / POOL / Christian Hartmann (Photo credit should read CHRISTIAN HARTMANN/AFP/Getty Images) As U.S. Retreats From World Organizations, China Steps in to Fill the Void
Beijing is trying to repurpose abandoned international agencies like UNESCO to serve its strategic interests — such as controlling the internet.
-
An image of an American flag stylized as a gun in Tehran, Iran. Abandoning Iranian Nuclear Deal Could Lead to New Wave of Cyberattacks
If Trump walks away from the pact, Tehran could see “retribution against Western targets.”
-
Fort Meade, UNITED STATES: A computer workstation bears the National Security Agency (NSA) logo inside the Threat Operations Center inside the Washington suburb of Fort Meade, Maryland, intelligence gathering operation 25 January 2006 after US President George W. Bush delivered a speech behind closed doors and met with employees in advance of Senate hearings on the much-criticized domestic surveillance. AFP PHOTO/Paul J. RICHARDS (Photo credit should read PAUL J. RICHARDS/AFP/Getty Images) Is the NSA Doing More Harm Than Good in Not Disclosing Exploits?
Inside the complicated national security calculus behind disclosing zero-day vulnerabilities.
-
may macron At U.N., Leaders Tell Tech Industry to Do More to Fight Terrorism
Online radicalization drives calls for a tougher crackdown on propaganda and encrypted messages.
-
TO GO WITH AFP STORY BY ASAAD ABBOUD A Saudi man prepares to login into his Twitter account on his laptop on October 6, 2013 at his office in Riyadh. Despite sitting on the world's largest wealth of oil, Saudis complain their salaries are not enough to make ends meet, and have taken to Twitter demanding better income. AFP PHOTO/FAYEZ NURELDINE (Photo credit should read FAYEZ NURELDINE/AFP/Getty Images) Twitter Suspended Far Fewer Terrorist Accounts in First Half of 2017
The number is declining because policing efforts are improving, company says.
-
CAMBRIDGE, MA - JANUARY 27: Snow falls in Harvard Yard on January 27, 2015 in Cambridge, Massachusetts. Boston, and much of the Northeast, is being hit with heavy snow from Winter Storm Juno. (Photo by Maddie Meyer/Getty Images) Harvard Caves to CIA Pressure, Revokes Chelsea Manning Title
Manning, the transgender former soldier who leaked thousands of diplomatic cables, lost her honorary title.
-
The guided-missile destroyer USS John S. McCain, with a hole on its portside after a collision with an oil tanker, makes its way to Changi naval base in Singapore on August 21, 2017. Ten US sailors were missing and five injured after their destroyer collided with a tanker east of Singapore early Monday, the second accident involving an American warship in two months. / AFP PHOTO / Roslan RAHMAN (Photo credit should read ROSLAN RAHMAN/AFP/Getty Images) U.S. Navy Investigating if Destroyer Crash Was Caused by Cyberattack
The probe of the USS John S. McCain collision will be a model for future investigations.
-
WASHINGTON - OCTOBER 02: Erik Prince, chairman of the Prince Group, LLC and Blackwater USA, holds up a picture showing the affect of a car bomb while testifying during a House Oversight and Government Reform Committee hearing on Capitol Hill October 2, 2007 in Washington DC. The committee is hearing testimony from officials regarding private security contracting in Iraq and Afghanistan. (Photo by Mark Wilson/Getty Images) Why Is Erik Prince Backing a Secure Communications Company?
America’s most notorious security contractor is quietly investing in privacy apps.
-
(FILES) A photo taken on March 10, 2011 of Russian anti-virus program developer and CEO of Moscow-based Kaspersky Lab, Yevgeny Kaspersky giving an interview to AFP at his company's offices in Moscow. The son of Russian software tycoon Eugene Kaspersky has been kidnapped in Moscow and his abductors are demanding a 3 million euro ($4.4 million) ransom for his release, reports said on April 21, 2011. The Lifenews.ru news website said that unknown men abducted Ivan Kaspersky, 20, on Tuesday morning and then made the ransom demand to his father by phone.AFP PHOTO / ALEXEY SAZONOV (Photo credit should read Alexey SAZONOV/AFP/Getty Images) Feds Ban Government Use of Kaspersky Software
The Russian firm’s products have been deemed an 'unacceptable risk.'