Menu Close

Articles on Cyberattacks

Displaying 141 - 160 of 166 articles

Inside the U.S. Army’s Cyber Operations Center at Fort Gordon, Georgia. Army-Cyber/flickr

America is ‘dropping cyberbombs’ – but how do they work?

The country’s actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
Temelin nuclear power plant, Czech Republic. IAEA/Flickr

How to protect nuclear plants from terrorists

Recent terrorist attacks have heightened concerns about the security of nuclear plants. A former top U.S. nuclear regulator says security is weak at many sites worldwide.
Federal computer systems are under near-constant attack from hackers and cyberthieves. Is our information protected well enough? Colin

Why the IRS was just hacked – again – and what the feds can do about it

Federal networks need stronger cybersecurity measures than most organizations, but have not yet gotten the budget or staffing commitments that would protect them properly.
The fingerprints might indicate China, but that’s not so easy to prove. Shutterstock

How we trace the hackers behind a cyber attack

This week’s hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it’s notoriously difficult to pinpoint the origin of a hack.
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it. Midnight via www.shutterstock.com

Zero-day’ stockpiling puts us all at risk

“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
No one is immune from cyber crime… no matter how protected you think you are. Flickr/Louish Pixel

Why we should all care about cyber crime: the risk to you and me

If you think you’re not at risk from cyber crime then think again. Everyone connected to the internet is a potential target and hackers are gathering what they can to try to gain your trust.

Top contributors

More