A British teenager who gained notoriety for hacking a number of high profile United States government employees including former CIA director John Brennan and former director of intelligence James Clapper was sentenced Friday to two years in prison.
Self-proclaimed cyber terrorists tend to have one thing in common: They think police can’t catch them. And almost always, these sad men sitting at computers are wrong. That seems to be the case with Brian Kil, a fictional Facebook bad guy who liked to extort underage girls into sending him nudes, according to the FBI.…
I don't know how we missed this chart on its first go-around (it was created by Eli Dourado in May 2014, using data extrapolated from a 2013 op-ed by Jon Mooallem, who spent the summer of that year keeping track of power outages caused by squirrels), but it is everything, and you deserve to know that it exists.
Hasraf Dulull is a master of digital visual effects with an uncanny vision of our near future: A tech company creates an army of badass android data couriers to fight against cyber-terrorism.
The simplicity of the iPad means the potential for unlikely users such as babies, or even orangutans. But are monkeys really our friends?
Cyber-terrorists could target the U.S. electrical grid and throw the nation into chaos, lawmakers warned at a hearing of the House Energy and Commerce Subcommittee. There are "many PhDs" inside Al Qaeda, and cyber-spies have already infiltrated the electricity system.
Cyber-terrorists have already compromised the U.S. military's computers and caused blackouts in Brazil, according to tonight's 60 Minutes. Better stock up on canned goods and flashlight batteries for the next big cyber-attack!
Next week, for the first time, the public will be able to see how our government might respond to a full-fledged act of cyber terrorism, in a simulation that will include top intelligence and security officials.
The U.S. Military has spent millions of dollars on counterfeit computer components over the years, according to an FBI report. This not only screws over businesses, but it also makes it easier for cyber-terrorists to hack into our systems by putting trojans and viruses in fake circuitry. An anti-counterfeit initiative…