cyber warfare

Visit/cyber-security/34798/labour-party-targeted-by-large-scale-cyber-attack
cyber security

Labour Party targeted by ‘large scale’ cyber attack

Election campaigning was 'slowed down' but the attack ultimately failed, and no data was lost
12 Nov 2019
Visit/security/34773/tenable-declares-there-are-far-worse-security-threats-to-fear-than-zero-day-exploits
Zero-day exploit
Security

Tenable: There are far more dangerous threats than zero-days

‘If you’re scared of zero-days, you don’t know what you’re talking about’ claims Tenable
7 Nov 2019
Visit/security/34715/us-allies-targeted-by-whatsapp-video-hack
WhatsApp, Web app, Messaging
Security

US allies targeted by WhatsApp video hack

Victims include high profile government and military officials spread across 20 countries, report
1 Nov 2019
Visit/security/34711/could-virgin-galactic-s-ipo-indicate-an-interstellar-step-change-for-cyber-security
Virgin Galactic
Security

Is cyber security about to go interstellar?

When we think about the cyber attacks of the future, we may have to think bigger
30 Oct 2019
Advertisement
Visit/security/34710/forget-ransomware-a-lack-of-global-norms-is-killing-the-security-industry
Mockup of global norms agreement
Security

A lack of global norms is killing the security industry

Better protocols to facilitate global cyber co-operation should be at the forefront of innovation in the sector
30 Oct 2019
Visit/security/34667/russian-hacking-group-masquerades-as-iranian-spy-network
Security

Russian hacking group masquerades as Iranian spy network

Hacking technique highlights how difficult it is to attribute blame after a cyber attack
21 Oct 2019
Visit/security/34511/tech-giants-form-cyber-security-supergroup
Security

Tech giants form cyber security 'supergroup'

Microsoft, Mastercard and others band together to help organisations get through attacks
27 Sep 2019
Visit/security/28170/what-is-cyber-warfare
Security

What is cyber warfare?

We explain what cyber warfare is and why you need to pay attention to the threats it poses
20 Sep 2019
Visit/cyber-warfare/34444/universities-a-huge-target-for-nation-state-attackers-warns-ncsc
Cardiff University
cyber warfare

Universities a 'huge target' for nation-state attackers

The UK's leading cyber security agency issued advie to elite academic institutions on how keep them and their country safe
19 Sep 2019
Advertisement
Visit/cyber-warfare/34282/wannacry-style-cyber-attack-could-trigger-full-nato-response-says-secretary
cyber warfare

WannaCry-style cyber attack could trigger full NATO response

It marks the second time the military alliance has tried to incorporate cyber threats into the treaty
28 Aug 2019
Visit/security/34077/nsa-to-create-new-division-to-bolster-us-cyber-defences
Security

NSA to create new division to bolster US cyber defences

Focus on defensive operations comes amid mounting geopolitical tensions
24 Jul 2019
Advertisement
Visit/security/34065/decision-on-huaweis-uk-presence-faces-further-delays
Huawei building
Security

Decision on Huawei's UK presence faces further delays

Uncertainty around the permanence of the US trade ban is halting the government's progress
23 Jul 2019
Visit/cyber-warfare/34060/french-army-will-employ-sci-fi-writers-to-predict-cyber-threats
Science fiction on a typewriter
cyber warfare

Sci-fi writers to predict cyber threats

The content of this work, however, will remain highly confidential to keep it from inspiring potential adversaries
22 Jul 2019
Visit/security/34038/microsoft-warns-business-customers-at-risk-of-state-sponsored-attacks
Graphic depicting cyber warfare as a soldier works in a room full of computers
Security

Microsoft warns enterprises over state-sponsored attacks

Geopolitical tensions on the rise ahead of the 2020 US presidential race
18 Jul 2019
Visit/cyber-warfare/33958/are-we-in-the-midst-of-a-cyber-war
Cyber war cyber warfare cyber terrorism concept
cyber warfare

Are we in the midst of a cyber war?

Trump's decision to attack Iran with digital weapons offers us a glimpse into the future of conflict
4 Jul 2019
Advertisement
Visit/security/33926/former-yandex-ciso-weighs-in-on-alleged-five-eyes-hack
Russian hack concept
Security

Former Yandex CISO weighs in on alleged Five Eyes hack

It's not known which of the alliance's five countries is behind the espionage operation
28 Jun 2019
Visit/cyber-attacks/33904/nation-state-hackers-launch-massive-attack-on-mobile-networks
Mobile network hack
cyber attacks

Nation-state hackers launch huge attack on mobile networks

China is believed to be behind the years-long hack that allowed it know everything about the victims
25 Jun 2019
Visit/cyber-warfare/33895/president-trump-authorises-cyber-attack-on-iran
Trump
cyber warfare

President Trump authorises cyber attack on Iran

Tensions have been escalating for weeks in the Gulf but Trump opted for digital rather than physical retaliation
24 Jun 2019
Visit/security/33779/how-mr-robot-fudged-its-hacks-to-protect-the-public
Mr. Robot poster
Security

How Mr. Robot ‘fudged’ its hacks to protect the public

Showrunners debated over how accurate to make the show’s exploits
5 Jun 2019
Visit/cyber-warfare/33710/defence-secretary-commits-22m-to-fund-army-cyber-operations-centres
Graphic depicting cyber warfare as a soldier works in a room full of computers
cyber warfare

Defence Secretary commits £22m to cyber operations centres

Centres will be tasked with defending against cyber threats both foreign and domestic
24 May 2019
Visit/security/33694/former-us-defence-chief-calls-for-public-and-private-sector-cyber-taskforce
Former US secretary of state Madeleine Albright
Security

Public and private must jointly combat cyber warfare

Non-state actors must be let in on cyber security discussions or our biggest public institutions will fall behind
23 May 2019
Advertisement
Visit/security/33604/anthem-healthcare-insurance-hacker-charged-by-fbi
Chinese hacker
Security

Anthem healthcare insurance hacker charged by FBI

US law enforcement pursuing China-based hackers for 11-month hacking campaign
10 May 2019
Visit/security/33581/chinese-hackers-used-stolen-nsa-tools-a-year-before-they-were-leaked-by-the-shadow
Fingerprint on a Chinese key on a keyboard to denote cyber crime
Security

Chinese hackers used NSA tools before Shadow Brokers leak

Evidence shows 'Buckeye' was using Bemstour and DoublePulsar tools as early as March 2016
7 May 2019