Florida city to pay $600K ransom to hacker who seized computer systems weeks ago ~tech security.cyber Article 5 votes
The trade secret - Firms that promised high-tech ransomware solutions almost always just pay the hackers ~tech security.cyber Article 9166 words 9 votes
Electricity grid cybersecurity will be expensive – who will pay, and how much? ~enviro energy Article 716 words 3 votes
Marcus “MalwareTech” Hutchins pleads guilty to writing, selling banking malware ~tech security.cyber Article 588 words 6 votes
Hated and hunted - The perilous life of the computer virus cracker making powerful enemies online ~tech security.cyber Article 3230 words 9 votes
Triton is the world’s most murderous malware, and it’s spreading ~tech security.cyber Article 2863 words 16 votes
Australia accuses foreign government of cyber attack on lawmakers ~news politics australia Article 341 words 3 votes
Russia to disconnect from the internet as part of a planned cyberwar test ~tech security.cyber Article 514 words 33 votes
A profile of Alex Stamos, former security chief at Yahoo and Facebook who was at ground zero of major cyberattacks and Russian election interference ~tech facebook social media security.cyber Article 10 313 words 6 votes
China link possible in cyber attack on Australian Parliament computer system, ABC understands ~news australia china politics Article 588 words 2 votes
German cybersecurity chief: Anyone have any evidence of Huawei naughtiness? We won't be having a word with local firms until then ~tech security.cyber security.national Article 507 words 11 votes
Cloudflare is providing services to at least seven designated foreign terrorist organizations and militant groups ~tech security.cyber Article 1716 words 12 votes
BlackBerry buys cybersecurity firm Cylance for $1.4 billion ~tech security.cyber Article 206 words, published Nov 16 2018 5 votes
The Web is still a DARPA weapon ~tech internet security.cyber Article 2298 words, published Jul 31 2018 12 votes
Japan cybersecurity minister admits he has never used a computer ~tech security.cyber Article 510 words 25 votes
IBM to acquire software company Red Hat for $34 billion ~tech linux security.cyber Article 73 words 54 votes
Nearly all new US weapons systems have ‘critical’ cybersecurity problems, auditors say ~tech security.cyber Article 690 words 8 votes
Reckless campaign of cyber attacks by Russian military intelligence service exposed ~news usa russia united kingdom Link 8 votes
The untold story of NotPetya, the most devastating cyberattack in history ~tech security.cyber Article 6546 words 11 votes
Cybersecurity experts from Homeland Security, the National Intelligence director's office, and private industry discussed how they're working to counter the most urgent threats ~tech security.national security.cyber Article 1976 words 3 votes
‘It’s our time to serve the Motherland’ How Russia’s war in Georgia sparked Moscow’s modern-day recruitment of criminal hackers ~tech security.cyber Article 3991 words 6 votes
Sabotage laws give Australian PM Peter Dutton new powers over energy, port facilities ~news australia politics law Article 231 words 0 votes
Chinese hackers breach Australian National University, putting national security at risk ~tech security.national security.cyber Article 710 words 5 votes
Meet TLBleed: A crypto-key-leaking CPU attack that Intel reckons we shouldn't worry about ~tech security.cyber Article 2083 words 13 votes
Inside the bunkers and war rooms where major banks wage nightly battle on the frontline of cyber war ~finance banking Article 1201 words 5 votes
Memes that kill: The future of information warfare ~tech social media internet security.cyber Article 4953 words, published May 3 2018 7 votes
John Bolton pushing to eliminate White House cyber job ~tech security.cyber Article 1659 words 5 votes