Cyber-attack Australia: Sophisticated attacks from ‘state-based actor’, PM says ~tech security.cyber Article 769 words 7 votes
Prime Minister Scott Morrison says Australian organisations, including governments and businesses, are currently being targeted by a sophisticated foreign "state-based" hacker ~news australia politics Article 344 words 6 votes
Obscure Indian cyber firm spied on politicians, investors worldwide ~tech security.cyber Article 1017 words, published Jun 9 2020 5 votes
The confessions of Marcus "MalwareTech" Hutchins, the hacker who stopped WannaCry and was arrested by the FBI in 2017 ~tech internet security.cyber Article 13 662 words 33 votes
Microsoft and Intel project converts malware into images before analyzing it ~tech microsoft security.cyber Article 739 words 10 votes
Meet the mad scientist who wrote the book on how to hunt hackers ~tech security.cyber Article 2249 words 8 votes
Finland is preparing to defend itself against a mysterious activist group threatening to carry out cyberattacks – unless it gets some Bitcoin ~tech security.cyber Article 243 words 7 votes
The cybersecurity firm Tiversa dominated an emerging online market—before it was accused of fraud, extortion, and manipulating the federal government ~tech security.cyber Article 14 048 words 6 votes
Olympic destroyer - The untold story of the 2018 Olympics cyberattack ~tech security.cyber Article 7600 words 6 votes
NSA whistleblower dropped from Australian cyber conference at the last minute ~tech security.cyber Article 500 words 6 votes
The extortion economy: How insurance companies are fueling a rise in ransomware attacks ~tech security.cyber Article 3888 words 12 votes
Ottawa city hall has been targeted by cyber attacks more than 8,000 times in the past year ~tech security.cyber Article 608 words 8 votes
The sinkhole that saved the internet: Keeping the 'kill switch' alive is the only thing preventing another WannaCry outbreak ~tech internet security.cyber Article 3380 words 20 votes
Florida city to pay $600K ransom to hacker who seized computer systems weeks ago ~tech security.cyber Article 5 votes
The trade secret - Firms that promised high-tech ransomware solutions almost always just pay the hackers ~tech security.cyber Article 9166 words 9 votes
Electricity grid cybersecurity will be expensive – who will pay, and how much? ~enviro energy Article 716 words 3 votes
Marcus “MalwareTech” Hutchins pleads guilty to writing, selling banking malware ~tech security.cyber Article 588 words 6 votes
Hated and hunted - The perilous life of the computer virus cracker making powerful enemies online ~tech security.cyber Article 3230 words 9 votes
Triton is the world’s most murderous malware, and it’s spreading ~tech security.cyber Article 2863 words 16 votes
Australia accuses foreign government of cyber attack on lawmakers ~news politics australia Article 341 words 3 votes
Russia to disconnect from the internet as part of a planned cyberwar test ~tech security.cyber Article 514 words 33 votes
A profile of Alex Stamos, former security chief at Yahoo and Facebook who was at ground zero of major cyberattacks and Russian election interference ~tech facebook social media security.cyber Article 10 313 words 6 votes
China link possible in cyber attack on Australian Parliament computer system, ABC understands ~news australia china politics Article 588 words 2 votes
German cybersecurity chief: Anyone have any evidence of Huawei naughtiness? We won't be having a word with local firms until then ~tech security.cyber security.national Article 507 words 11 votes
Cloudflare is providing services to at least seven designated foreign terrorist organizations and militant groups ~tech security.cyber Article 1716 words 12 votes
BlackBerry buys cybersecurity firm Cylance for $1.4 billion ~tech security.cyber Article 206 words, published Nov 16 2018 5 votes
The Web is still a DARPA weapon ~tech internet security.cyber Article 2298 words, published Jul 31 2018 12 votes
Japan cybersecurity minister admits he has never used a computer ~tech security.cyber Article 510 words 25 votes
IBM to acquire software company Red Hat for $34 billion ~tech linux security.cyber Article 73 words 54 votes
Nearly all new US weapons systems have ‘critical’ cybersecurity problems, auditors say ~tech security.cyber Article 690 words 8 votes
Reckless campaign of cyber attacks by Russian military intelligence service exposed ~news usa russia united kingdom Link 8 votes
The untold story of NotPetya, the most devastating cyberattack in history ~tech security.cyber Article 6546 words 11 votes
Cybersecurity experts from Homeland Security, the National Intelligence director's office, and private industry discussed how they're working to counter the most urgent threats ~tech security.national security.cyber Article 1976 words 3 votes
‘It’s our time to serve the Motherland’ How Russia’s war in Georgia sparked Moscow’s modern-day recruitment of criminal hackers ~tech security.cyber Article 3991 words 6 votes
Sabotage laws give Australian PM Peter Dutton new powers over energy, port facilities ~news australia politics law Article 231 words 0 votes
Chinese hackers breach Australian National University, putting national security at risk ~tech security.national security.cyber Article 710 words 5 votes
Meet TLBleed: A crypto-key-leaking CPU attack that Intel reckons we shouldn't worry about ~tech security.cyber Article 2083 words 13 votes
Inside the bunkers and war rooms where major banks wage nightly battle on the frontline of cyber war ~finance banking Article 1201 words 5 votes
Memes that kill: The future of information warfare ~tech social media internet security.cyber Article 4953 words, published May 3 2018 7 votes
John Bolton pushing to eliminate White House cyber job ~tech security.cyber Article 1659 words 5 votes