LATEST ARTICLES

Companies want a Digital Geneva Convention; researchers demur

The call for a cyber Geneva Convention is one Microsoft has been echoing for some time. After the recent WannaCry and NotPetya attacks, however, their vigor...

China’s Cyber Power

https://youtu.be/gTKfdFxRZuo

The role of cybersecurity in Chinese foreign policy

https://youtu.be/zcO0mIfkYqU

FBI and NSA Poised to Gain New Surveillance Powers Under Trump

The FBI, National Security Agency and CIA are likely to gain expanded surveillance powers under President-elect Donald Trump and a Republican-controlled Congress, a prospect...

The UK Just Legalized Mass Surveillance

On Tuesday, the UK is due to pass its controversial new surveillance law, the Investigatory Powers Act, according to the Home Office. The Act, which...

TR-069 NewNTPServer Exploits: What we know so far

What is "TR-069" TR-069 (or its earlier version TR-064) is a standard published by the Broadband Forum. The Broadband Forum is an industry organization defining...

Firefox Zero-Day Exploit to Unmask Tor Users Released Online

Hackers are actively exploiting a zero-day vulnerability in Firefox to unmask Tor Browser users, similar to what the FBI exploited during an investigation of...

The Tor Project has long offered high-security alternatives for folk who are especially concerned about their privacy. But as the world goes mobile, and...

Donald Trump’s smartphone is a risk to US national security, warn...

Security experts in the US are concerned that Donald Trump's smartphone could be easy prey for hackers, who could exploit the president-elect's use of...

What Is Cyber Collateral Damage? And Why Does It Matter?

In the world of kinetic military operations, collateral damage is typically straightforward to assess because of well-established definitions, well-understood weapon characteristics, and reasonably well-defined...