Quantcast
Channel: Journal of Law & Cyber Warfare » Industries
Browsing latest articles
Browse All 15 View Live

NSA slapped malware on 50,000+ networks, says report

A new slide culled from the trove of documents leaked by Edward Snowden shows where the NSA placed malware on more than 50,000 computer networks worldwide, according to Dutch media outlet NRC. The NSA...

View Article



Rockefeller to offer cybersecurity amendment to Defense bill | TheHill

Senate Commerce Committee Chairman Jay Rockefeller (D-W.Va.) plans to offer his cybersecurity bill as an amendment to the Defense authorization bill Thursday. The amendment has the support of Senate...

View Article

Cyber Warfare Keeps Insurance Execs Awake at Night

In addition to a global pandemic and major natural catastrophe, global insurance executives ranked cyber warfare among the extreme risks that could rattle the industry in a new survey by Towers Watson...

View Article

Adam Meyer on Implementing the Cyber Security Framework

While the Federal Cyber Security Framework (CSF) drafting process has been one of the better collaboration exercises the government and private sector have engaged in for quite some time, it has also...

View Article

Defense industry: Cyber, anti-riot, special forces emerging niche markets

Turkey’s local defense companies and their foreign partners may see a near-boom in smaller but specialist industries in the coming years, including cyber technologies, anti-riot equipment and a variety...

View Article


Beijing Firmly Rejects Latest Hacking Accusations

China on Tuesday rejected a US computer security firm’s accusation of Chinese hacking against European countries before the G20 Summit in September. According to recent media reports quoting research...

View Article

Cyber Warfare: The Black Hole of Online Crime

Christmas is coming, and in the build-up millions of people across the UK will be shopping for presents online. But the Met Police has warned web users that it is a time when many could also become the...

View Article

Tech Threats Abound Beyond Spam, Malware During Holidays

The ubiquitous warnings about online shopping risks are well founded. As numerous experts are reminding consumers and businesses, the high season for shopping is also the high season for cybercrime. To...

View Article


9 Notorious Hackers Of 2013

Who should make the list of the world’s most notorious hackers in 2013? If recent years are any guide, crime-committing hacktivists should loom large. In 2011, LulzSec stormed on to the scene, pulling...

View Article


Barry University Acknowledges Security Breach

The Miami Herald reports that Florida’s Barry University recently began notifying patients of its Foot and Ankle Institute that their medical records and personal information may have been accessed by...

View Article

China’s Version of Paypal Lost a Huge Trove of User Data – And Didn’t Notice...

The online payment platform Alipay has apologized to customers after user information including names and home addresses, were stolen. The apology came a bit late—some three years after the fact. The...

View Article

The Internet of Things Is Wildly Insecure — And Often Unpatchable

We’re at a crisis point now with regard to the security of embedded systems, where computing is embedded into the hardware itself — as with the Internet of Things. These embedded computers are riddled...

View Article

Sticking It To The ATM

Ever since Barnaby Jack leapt on stage at Black Hat USA and had ATMs spew money as if it were going out of style, hackers around the globe have been busy trying to replicate the research before banks...

View Article


Department of Homeland Security Issues Malware Alert

The Department of Homeland Security’s United States Computer Emergency Readiness Team (US-CERT) recently issued a malware-POS alert, TA14-002A, entitled “Malware Targeting Point of Sale Systems.” The...

View Article

Do We Need Cyber Warfare Treaties? Study Looks at Legacy of Stuxnet

Over the last few years, Iran, China and the United States have all deployed weapons capable of damaging physical infrastructure, all without a single explosion. Unlike conventional weapons, these...

View Article

Browsing latest articles
Browse All 15 View Live




Latest Images