Articles on Cyber attack

Displaying 1 - 20 of 30 articles

Cyber attackers lurk in the shadows wielding the ability to hit governments where it hurts the most. Shutterstock

Is cyberspace the latest conflict frontier on the African continent?

Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
Should one person lead two different government agencies? U.S. government images

Should NSA and Cyber Command have separate leadership?

The key factor to consider is not cooperation, but rather focus: One is an offensive military unit and the other a defensive civilian agency.
Inside the U.S. Army’s Cyber Operations Center at Fort Gordon, Georgia. Army-Cyber/flickr

America is ‘dropping cyberbombs’ – but how do they work?

The country's actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
The fingerprints might indicate China, but that’s not so easy to prove. Shutterstock

How we trace the hackers behind a cyber attack

This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.

Top contributors

More