Unmasked, but Unfazed—Chinese Hacking Group Is Still Active
• Technologyreview.comAn exposé of its methods and technology may not have deterred a group targeting U.S. corporate secrets.
ON AIR NOW
Click to Play
An exposé of its methods and technology may not have deterred a group targeting U.S. corporate secrets.
US copyright holders like the RIAA and MPAA have a new weapon to battle piracy. Read on to find out what it is, how it works, and whether you should be scared to snag a torrent of this week's episode of Justified.
An expert says U.S. intelligence believe four countries actively attack U.S. computers. But aside from China and Russia, who’s on the list?
Securing critical infrastructure needs to go far beyond the measures in President Obama’s recent executive order.
The nation's biggest Internet service providers have teamed up to stop their customers from enjoying illicit downloads of their favorite music, TV, and movies, the Wall Street Journal reports.
As Iran met in Kazakhstan this week with members of the UN Security Council to discuss its nuclear program, researchers announced that a new variant of the sophisticated cyberweapon known as Stuxnet had been found, which predates other known versions
CrowdStrike says it can help U.S. companies identify the companies that benefit from stolen data.
The major recent corporate hackings all have something in common: human error. The good news is that there's an easy fix.
Earlier this week, Mandiant, a company hired by The New York Times to track down hackers that invaded the paper's database, unleashed a report blaming China for the invasion.
According to a detailed threat analysis published this week by Northern Virginia’s Mandiant, hackers employed by the Chinese government have waged a sophisticated cyberwar against entities in the United States and elsewhere, compromising over 100 com
Like the Burger King hacking yesterday, the hackers included some McDonald's images. The avatar photo has been changed to the Cadillac symbol.
On a rainy Monday in August 2011, a 10-million-watt transformer exploded in northern Virginia, sending an enormous voltage spike across the power grid. The surge hit an Amazon data center in Ashburn, Virginia, knocking out the facility’s main source
The Chinese army appears to be conducting cyberhacking and espionage against large US corporations, according to an extensive report from computer security firm Mandiant
The Chinese army appears to be conducting cyberhacking and espionage against large US corporations, according to an extensive report from computer security firm Mandiant.
Burger King's Twitter account got hacked for more than an hour and tweeted out some crazy McDonald's messages.
We’ve discussed many times before—hardly a month goes by without some major action against Internet users… from Obama’s ‘kill switch’, to ACTA, SOPA and PIPA, to stasi tactics against people like Kim Dotcom.
An intriguing story surfaced this week about a mysterious hacker named Zhang Changhe, who is apparently working for the Chinese army coordinating a botnet of zombie computers infested with malware, according to Bloomberg BusinessWeek.
U.S. law enforcement wants companies to covertly install so-called computer back doors in the software they produce. This would allow the government to access information on any computer using the software without being detected
President uses State of the Union address to launch effort to protect infrastructure against a “growing threat.”
The U.S. government is developing new computer weapons and driving a black market in “zero-day” bugs. The result could be a more dangerous Web for everyone.
The secretive outlaw hacktivist group Anonymous has publically asked its supporters to create a ‘virtual blockade’ to keep President Obama’s State of the Union address off the Web.
Government agencies and companies both public and private are lining up to confess that their security has been breached by Chinese hackers.
Software makers Microsoft Corp and Symantec Corp said they disrupted a global cyber crime operation by shutting down servers that controlled hundreds of thousands of PCs without the knowledge of their users.
News Corp. CEO Rupert Murdoch said late Tuesday night in a plainly straightforward tweet that Chinese hackers were still targeting The Wall Street Journal:
The concentrated cyber attack that breached the defenses of U.S. Department of Energy [DoE] last week may be the scariest yet.
Coding isn’t just for computer whizzes, says Mitch Resnick of MIT Media Lab -- it’s for everyone.
Recent events have highlighted the fact that hackers, coders, and geeks are behind a vibrant political culture.
Twitter hacking attack targeted 250,000 user's personal information, the latest in a string of attacks.
Eric Schmidt, the executive chairman of Google, has criticised China in his new book, describing the country as the world's "most sophisticated and prolific hacker".
Mega founder Kim Dotcom is offering a bounty of roughly $13,580 to the first person who can break its security system, The Next Web reports.