Zimbabwe’s draft ICT legislation on cybercrime, electronic transactions, and data has drawn a lot of attention in the past month as an increasing number of citizens pay close attention the impact that these laws will have in their lives.
Cyber espionage in India is not a new concept but has been in existence for the last decade. It may be carried out by an insider or an outsider by exploiting the vulnerabilities in the cyber security of an organisation.
U.S. is guilty of its own cyberspying
Writer Eli Lake’s Opinion piece on the hacking of computers at the Democratic National Committee lists reasons to explain why the United States is treating this incident less sternly than cyberattacks by China,
The aftermath of the cyberattack in Ukraine on Dec. 23, 2015, produced two unexpected lessons that U.S. grid operators have started to take to heart.
After cutting off power to nearly 250,000 homes and businesses in western Ukraine, the cyber
The Turkish government has blocked access to the WikiLeaks Web site in the country after the whistle-blower organisation released nearly 300 000 e-mails from president Recep Tayyip Erdogan’s ruling Justice and Development Party (AKP).
The country’s Internet watchdog, TIB, said
Imagine you’re an employee whose boss is on her way to Thailand for work. You and the rest of the team bid her farewell, then two hours later, an email arrives in your inbox.
I’m just about to board my
A report said that not one malicious cyber-threat was found, and the federal government spent more money than it received in collected sanctions.
Six months after issuing an executive order to handle the “national emergency” that the US faced amid
A number of high-profile cases involving international cyber attacks on the U.S. have been unsealed for the public. The incidents, released by the Department of Justice, involve everything from hacking U.S. banks to online hoaxes regarding a terrorist attack, and
While non-state actors today are not on par with nation states as far as cyber capabilities are concerned, terrorist groups, criminals, hackers and the like could possess destructive capabilities enjoyed by a small circle of nations in the not-so-distant future.
Hackers find ways of controlling hardware and software through releasing malicious computer viruses, and likewise governments use ‘soft and hard means’ to quell internal dissident voices of those who choose to speak out against them. This is the hard-line taken
The US has begun waging cyber warfare against Isis, defence secretary Ashton Carter has confirmed.
As the Financial Times reports, Carter said he has issued orders to the US Cyber Command to launch online attacks against the fundamentalist group.
Bangkok: Six official websites of Thai government were hacked on Monday allegedly by an Islamic group from Tunisia which posted pictures of Rohingya Muslims fleeing persecution in Myanmar on the webpages.
The Islamic group calling itself Fallag Gassrini & Dr
ST. LOUIS, MO (KTVI) – Is St. Louis at the center of a cyber attack from China? A company that monitors threats on the internet shows a large amount of traffic headed into the area from China. They say this
The Coast Guard’s leadership has outlined a new cyber strategy while renewing long-standing complaints that a lack of funding has hamstrung proven efforts to interdict drug trafficking.
The leadership last week put forward arguments for increased support of a unique
SINGAPORE (Reuters) — Security researchers have many names for the hacking group that is one of the suspects for the cyber-attack on the U.S. government’s Office of Personnel Management: PinkPanther, KungFu Kittens, Group 72 and, most famously, Deep Panda.
Hackers and cyber-terrorists present an ever-evolving threat to airlines, with experts constantly testing for new vulnerabilities—including the fear that drones could be used to throw a plane off course.
Most agree hacking a plane would be a near-impossible feat, but
What if a team of Chinese agents had broken into the Pentagon or — less box office but just as bad — the US Office of Personnel Management and carted out classified documents?
The next day, the newspapers and morning
In theory, a massive breach of the federal government in which hackers stole personal information from four million current and former federal employees should merit an equally massive retaliatory response. In practice, though, the rules for cyber conflict – a new
An Iowa man has been indicted on charges he allegedly threatened to kill Muslims in a Boston Islamic center.
Fifty-seven-year-old Gerald Wayne Ledford of Clinton is accused of posting threats on the Facebook page for the Islamic Society of Boston