Menu Close

Articles on Computer hacking

Displaying 1 - 20 of 36 articles

Money is a crucial target for North Korea’s hacking efforts. rega rega/Shutterstock.com

North Korea’s growing criminal cyberthreat

North Korea’s cyber army is closely controlled by the ruling regime – a key difference from other countries’ cyberattack and espionage groups.
At CIA headquarters on Jan. 17, Trump said the ‘dishonest media’ made it appear he was having a feud with the intel community. Olivier Douliery/AP via CNP

Six myths about national security intelligence

The president, the press and the public have misguided ideas about how intelligence is produced and analyzed. A Georgetown professor sets us straight.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing. REUTERS/Lucy Nicholson

Hacking the terror suspect’s iPhone: what the FBI can do now Apple says ‘no’

Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect’s iPhone?
Anti-virus software can keep cyber-criminals at bay. shutterstock

Seven easy steps to keep viruses from your devices

Throwing a safety net over one’s computer, mobile handset or tablet is a necessity because of the threat of viruses and infections through removable devices.

Top contributors

More