Inside the U.S. Army’s Cyber Operations Center at Fort Gordon, Georgia.
The country's actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
Temelin nuclear power plant, Czech Republic.
Recent terrorist attacks have heightened concerns about the security of nuclear plants. A former top U.S. nuclear regulator says security is weak at many sites worldwide.
Cyber weapons are allowing states to attack each other without fear of retaliation. The consequences potentially are devastating.
Federal computer systems are under near-constant attack from hackers and cyberthieves. Is our information protected well enough?
Federal networks need stronger cybersecurity measures than most organizations, but have not yet gotten the budget or staffing commitments that would protect them properly.
Could the hack that took out the power grid in Ukraine happen in the U.S.?
Malware has brought down the power grid in the Ukraine. What were attackers after and could it happen elsewhere?
Steag/VGB Power Tech GmbH
The cyberattack that brought down a city's power supply in Ukraine is a cautionary tale for what lies ahead.
The fingerprints might indicate China, but that’s not so easy to prove.
This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
Anonymous can do more harm than good in its war on Islamic State.
The Anonymous hacktivist group engaged in an online war against Islamic State may be doing more harm than good.
There are a few things you can do to keep yourself safe online.
Getting the basics of cybersecurity right could eliminate 85% of the threats overnight. Here are some tips to get you started.
When Facebook goes down it's an irritation. But as the world moves its data and processing to the cloud, the potential for major loss grows ever greater.
More jaw jaw, less war war.
Sanctions against Russia and China would only escalate cyber-attacks, when what's needed is international agreement.
How secure are your passwords?
No matter how many times people are warned to set strong secure passwords, many don't. So why do people take the risk? And is there anything else they can do to be more secure online?
Official U.S. Air Force/Flickr
A new report on the future of humanity explains what we really need to be worrying about over the next 35 years.
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
No one is immune from cyber crime… no matter how protected you think you are.
If you think you're not at risk from cyber crime then think again. Everyone connected to the internet is a potential target and hackers are gathering what they can to try to gain your trust.
“Unit 61398,” a secretive Chinese military unit believed to be behind many hacking attacks, sits on the outskirts of Shanghai.
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
The internet of things – including the equipment on the power grid – is increasing cybersecurity risks for all critical infrastructure.
More than just a cyber “whodunnit.”
Lee Jae Won/Reuters
Many questions remain about the hack on government employee data but the US has to treat the data theft as a high-level diplomatic incident.
A new threat to secure online communication could be a symptom of a wider cyber security problem.
Why did Penn State take so long to disclose the breach?
Laptop image via www.shutterstock.com
The recent cyber attacks at Penn State have put personal information of 18,000 students in the hands of hackers. What should universities do to protect students' privacy?