List of Cyber Security & Hacking articles
-
fp-placeholder-social-share-3-2 Putin Steals Oppo Files on Most Pro-Putin 2016 Candidate
Hackers likely working on behalf of the FSB and GRU broke into DNC servers.
-
fp-placeholder-social-share-3-2 Now Poland’s Government Is Coming After the Internet
Warsaw is tightening control over the Web in the name of national security — and setting an ominous precedent for other democracies.
-
fp-placeholder-social-share-3-2 Preventing a Blackout by Taking the Power Grid Offline
What can stop hackers from turning off America’s lights? Old-school equipment that’s not connected to the web.
-
fp-placeholder-social-share-3-2 Cambodian Prime Minister Hun Sen Shows Off His Beach Bod to Celebrate Ramadan
Heads of state tend to use social media to proliferate flattering images of themselves. Not Hun Sen.
-
fp-placeholder-social-share-3-2 The ‘Little Boy’ of Cyberspace
Academy Award winner Alex Gibney on how cyber weapons like Stuxnet are changing the future of war -- and why Washington isn't prepared for the fallout.
-
fp-placeholder-social-share-3-2 Turns Out That Maybe You Shouldn’t Trust the ‘Media’
From Iran to China, repressive governments are posing as journalists to hack into the computers of dissidents and other enemies of the state.
-
fp-placeholder-social-share-3-2 Bank Thefts Show North Korea’s Hacking Prowess
Pyongyang’s hackers may have tried to steal $1 billion from a Bangladeshi bank.
-
fp-placeholder-social-share-3-2 Spy Chief: Hackers Are Targeting Clinton and Trump Campaigns
The pace of attacks will only pick up as the election drags on.
-
fp-placeholder-social-share-3-2 How Steel City Became the Front Line in America’s Cyberwar
Blending gumshoe investigations with high-tech research, Pittsburgh has become a hotbed of the Justice Department’s fight against international hackers.
-
fp-placeholder-social-share-3-2 Vote for your favorite essay on how the US military needs to adapt to the 21st century
Here are the 21 entries that I ran in the essay contest about the one thing the U.S. military needs to do most to adapt to the Information Age. Now it is time to vote for the one you think is best.
-
fp-placeholder-social-share-3-2 Dating Site Wants to Help Americans Flee Trump by Meeting Canadians
Joe Goldman, 25, is dead serious about dating across the 49th parallel.
-
fp-placeholder-social-share-3-2 How to Defeat Extremism Without Becoming Egypt’s Microserf
As Cairo enlists Microsoft’s help in curbing terrorism, experts say the tech giant must avoid being a prop for Egypt’s crackdown on free expression.
-
PERTH, AUSTRALIA - MARCH 31: An image of a U.S. P8 Poseidon can be seen on a monitor in the cockpit of a Royal New Zealand Air Force P3 Orion while flying to the search zone to help find the missing Malaysia Airlines Flight MH370 on March 31, 2014 in Perth, Australia. Several objects have been sighted in the Indian Ocean over the past few days, but none confirmed to be related to the missing airliner. The Malaysian airlines flight disappeared on March 8 with 239 passengers and crew on board and is suspected to have crashed into the southern Indian Ocean. (Photo by Rob Griffith - Pool/Getty Images) FBI Tricked Naval Intel Officer Into Spilling Info, Lawyers Say
Navy makes tapes of hearing for accused U.S. Navy spy available, adds new wrinkles
-
fp-placeholder-social-share-3-2 Guccifer Confirms Utter Boredom of Reading Clinton’s Emails
The Romanian hacker says he hacked Clinton's emails but didn't find them interesting.
-
Elahi-HeaderInfiniteLoop2s How to Invade Your Own Privacy So the Government Doesn’t Have To
In 2002, the FBI mistakenly identified Hasan Elahi as a terrorist. Since then, he’s offered free self-surveillance, posting more than 80,000 pictures online for the bureau — and the world — to see.