Congresswoman Marsha Blackburn of Tennessee stopped by Wolf Blitzer’s Situation Room to drop some knowledge about Friday’s massive DDoS attack that affected large swaths of the internet. Blackburn managed to say a lot of techy-sounding things until her time was up. No one walked away feeling smarter.
In the past, Donald Trump has been intentionally vague about his plan to “beat ISIS,” simply saying it will be done “very, very quickly.” On Tuesday, however, the Republican nominee finally revealed his secret weapon in the War on Terror: the word “cyber,” which, according to Trump, “is becoming so big today.”
ISIS has already been feeling the wrath of hacker collective Anonymous, and more recently, some Pentagon-backed hacking. But speaking to the New York Times, the Obama administration has declared it’s going to start “dropping cyberbombs.” Wait, what?
In the ongoing fight against Islamic State, the US is said to be attacking militants with “cyber bombs” according to Deputy Defense Secretary Robert Work.
Cyber attacks are an ever-increasing threat to the US. Just last year, a colossal hack believed to be conducted by China revealed personal information of more than 21.5 million people—and that was just one attack. To get into the San Bernardino shooter’s iPhone, the FBI had to pay at least $1 million to a hacker…
During a Pentagon press briefing today, Secretary of Defense Ash Carter and Chairman Joint Chiefs of Staff General Joseph Dunford said that the U.S. military will drastically accelerate attacks on ISIS where it may hurt them the most strategically: in cyberspace.
This week, the U.S. Department of State’s Defense Trade Advisory Group (DTAG) met to decide whether to classify “cyber products” as munitions, placing them in the same export control regime as hand grenades and fighter planes. Thankfully, common sense won out and the DTAG recommended that “cyber products” not be added…
Hunting quadrotors with #8 buckshot might be a valid pasttime for some people, but the US Army is looking for a little more refinement.
Sometimes being an intensely secretive regime trading in relentless obscurity has its perks: The US tried to secretly attack North Korea’s nuclear program with a computer virus, but failed because it couldn’t find the information necessary to infect the North Korean system with a virus.
When anti-Chinese censorship services got hit with a crippling distributed-denial-of-service attack last month, researchers quickly pegged China as the culprit. Now, Citizen Lab has pinpointed the Chinese tool that made this attack happen. They’re calling it the Great Cannon.
China is finally admitting what we've known for years: Yes, it has cyber warfare units, and plenty of them.
Warfare is a constantly changing landscape, from the weapons that are used to the battlefields they're fought on. Amidst mountains of Snowden leaks from the NSA and GCHQ, it's no longer a mystery that the digital warfare is advancing quickly, and the British Army just upped its digital artillery.
The holidays are a time for eggnog and presents and bizarre credulous rituals involving an old elf-man and his pack of flying caribou. It's also a time to cuddle up by the hearth and begrudgingly explain the latest technology news to your relatives. This week's edition: The Sony hack.
In an undisclosed location in New Jersey, there's a tiny little town that's used as a training grounds to prepare the military for cyber warfare. No, tinier than that. Think more like model train sized. It's called CyberCity, and WNYC's New Tech City recently paid a visit.
According to Bloomberg, the source of the huge Sony Pictures leak has been traced to a five-star hotel in Thailand's capital. Leaching off of the St. Regis hotel's high-speed wi-fi, the hackers, currently believed the work of the North Korea-linked group DarkSeoul, carried out their devastating and embarrassing…
Simply put, cyberwarfare is the use of hacking to conduct attacks on a target's strategic or tactical resources for the purposes of espionage or sabotage.
Security firm Kaspersky Lab has launched an interactive cyberthreat map that visualizes cyber security incidents occurring worldwide in real time. A quick glance shows that the world is a pretty scary place.
It's called "Snake" and it's being compared to another alleged state-run virus, Stuxnet. And yes, all evidence points to Russia.
It's been over three years since the discovery of the Stuxnet worm, but new revelations continue to trickle out from the cybersecurity community. Actually, this latest one is more of a torrent than a trickle: Turns out Stuxnet had an evil secret twin.
The problem with creating Stuxnet, the world's most sophisticated malware worm, is that it could eventually go rogue. Which is precisely what has happened. The US- and Israeli-built virus has spread to a Russian nuclear plant — and even the International Space Station.