So far, government-mandated Internet shutdowns have yet to mar Black Lives Matter protests. But they do occur far more regularly than you might expect.
On stage at DefCon, veteran NSA leader Rob Joyce says the agency’s ability to monitor and counteract international cyberattacks relies on recruiting—and working well—with hackers.
The technically detailed indictment of 12 Russian GRU officers implies a struggle to find appropriate and effective cybersecurity deterrents to geopolitical hacking, experts say.
Two decades after presenting at the Senate’s first cybersecurity hearing, veteran L0pht hackers Kingpin, Mudge, Weld Pond, and Space Rogue reflect on progress and urge for much more.
When researchers inspected the ingredients of SiliVaccine, North Korea-developed Windows antivirus software, they found a mix of spyware and old stolen Trend Micro code.
Virtual private networks, like all other software—and all software users—aren’t infallible as identity concealers. And investigators can use failures to track down their targets, such as Guccifer 2.0.
Symantec researchers say Inception Framework is hijacking vulnerable old routers to forward malicious traffic and thus obscure the source of its advanced persistent threats.
Security researchers at Recorded Future say China goes to great lengths to obscure truths in its software vulnerability disclosures, in part to conceal the inner-workings of its own cyberattacks.
Government agencies—and the individuals who work for them—often trust the deep-scanning skills of security software like Kaspersky’s to keep their computer files safe.
After President Trump fires James Comey, a leading U.S. backer of encryption backdoor mandates, officials in Europe and Australia renew arguments for the “technically infeasible.”
During a fireside chat in Las Vegas, Reps. Will Hurd of Texas and Jim Langevin of Rhode Island plead for proactive hacker-lawmaker collaboration and voice concerns about election security.