China-Linked Cyberspies Lure Victims With Security Conference Invites

A China-linked cyber espionage group known as Lotus Blossom, Elise and Esile has used fake invitations to Palo Alto Networks’ upcoming Cybersecurity Summit to...

Singapore’s weapon: cyber diplomacy

What more can Singapore do in a digital world where dependence on technology trades security for greater efficiency and connectivity? With more countries using technology...

Private Eyes.The Little-Known Company That Enables Worldwide Mass Surveillance

It was a powerful piece of technology created for an important customer. The Medusa system, named after the mythical Greek monster with snakes instead...

Will the present developments in driverless cars increase the potential for...

FBI believes the “game changing” vehicle could revolutionise high-speed car chases within a matter of years. The report also warned that autonomous cars may...

How the Grinch Stole IoT

Source: blog.level3.com Level 3 Threat Research Labs has previously reported on a family of malware that exploits Internet of Things (IoT) devices to create distributed...

New World Hackers Hacking group claims day’s hits Disruptions a dry...

On Friday, cyberattacks crippled a major Internet company, repeatedly disrupting the availability of popular websites across the United States. The hacker group claiming responsibility said...

The legal challenges for autonomous vehicles

Gartner described 2015 as the peak of the driverless car "hype cycle", as the battle between established car manufacturers and technology companies intensified to...

Mirai Botnet Pummels Internet DNS in Unprecedented Attack

nprecedented distributed denial-of-service attacks that began in the early hours of Oct. 21 triggered widespread internet disruptions, with numerous sites remaining intermittently inaccessible. Major...

DDoS Attack Blamed for Massive Outages

A massive distributed denial-of-service attack that began early Oct. 21 and continued in waves into the evening is suspected to be the cause of...

Politics 2.0: The Age of Cyber-Political Warfare

Cyber-Political Warfare Do you remember the last time hackers and cybercriminals determined the outcome of a presidential race? Of course not, because it’s never happened....