Similar Articles |
|
InternetNews October 27, 2010 |
Does the U.S. Need an Internet 'Kill Switch'? A majority of U.S. consumers surveyed said the government should have the authority to shut down parts of the Internet if necessary to head off a cyber attack. |
The Motley Fool January 25, 2011 Bryan Hinmon |
Protect Your Portfolio From Cyber Threats Defend your portfolio from The Attack of the Killer e-Tomatoes. |
InternetNews November 17, 2009 |
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. |
InternetNews July 29, 2010 |
U.S. General Details the Impact of Cyber War At the Black Hat security conference, retired General and former CIA director Michael Hayden explains the dangers of cyber attacks. |
National Defense January 2016 Stephanie Meloni |
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. |
InternetNews February 10, 2006 Roy Mark |
DoJ Wants Cyber Crime Stats The Department of Justice is launching its first national survey to measure the prevalence and impact of cyber crime on U.S. businesses. |
InternetNews July 28, 2010 |
Cyberattacks Hit Businesses With Big Bills New study from Ponemon Institute and security vendor ArcSight details rising cost of cyber-attacks, with businesses reporting at least one major attack a week. |
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |
The Motley Fool July 13, 2009 Rich Smith |
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. |
InternetNews January 28, 2010 |
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. |
InternetNews September 29, 2010 |
Cyber Storm Simulation Tests Nation's Readiness The three days of simulations sponsored by the Department of Homeland Security, are designed to test the U.S.'s ability to respond to a major attack on its digital infrastructure. |
InternetNews February 9, 2010 |
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. |
National Defense March 2015 Sarah Sicard |
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. |
InternetNews February 17, 2010 |
When the Cyber Attack Comes, Will We Be Ready? War-game simulation of a massive cyber attack on U.S. infrastructure highlights emergency provisions administration officials might be forced to take. |
The Motley Fool December 17, 2009 Eric Bleeker |
Hacking the Pentagon With $26 Iraqi insurgents provide another case study on the need for cyber security. While the market for defense-related cybersecurity solutions is currently small, it's set to grow at a fast pace. |
InternetNews August 4, 2009 |
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say. |
National Defense October 2015 Allyson Versprille |
Northrop Grumman Grows Sensor, Comms Offerings Northrop Grumman is investing more resources into its command, control, communications, computers, intelligence and reconnaissance products, executives told National Defense. |
InternetNews January 25, 2010 |
China Says Not Behind Cyber Attacks The alleged Chinese cyber attack on Google and other top U.S. Internet firms - and larger issues of China's Internet censorship - continue to fuel the escalating war of words between U.S. and Chinese officials. |
Fast Company Michael Grothaus |
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. |
National Defense July 2007 Breanne Wagner |
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. |
InternetNews June 30, 2009 Kenneth Corbin |
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.' |
InternetNews December 7, 2004 Roy Mark |
Execs Call for Tighter Cyber Security Control Security alliance claims White House and DHS are not doing enough to protect against cyber attacks. |
InternetNews February 17, 2005 Michael Singer |
Cyber Security Heads Grade The System Security groups recommend a more robust partnership between the public and private sectors to protect against cyberspace attacks and physical attacks. |
National Defense December 2013 Yasmin Tadjdeh |
Industry, Military Emphasize Need for 'Cyberwarrior' Training as Attacks Increase Government and military leaders have for years warned of increasingly pervasive and nefarious cyber-attacks. The network intrusions, perpetrated by nation states, hacktivists and thieves, are growing rapidly, experts have said. |
National Defense March 2013 Stew Magnuson |
Iran's Ability to Carry Out Attacks in Cyberspace May Be Improving The ability to carry out attacks from across the world that can do real physical or economic damage without ever launching a jet fighter or sending in suicide squads is tempting for adversaries such as Iran, U.S. officials and cybersecurity experts have pointed out. |
InternetNews March 31, 2010 |
Vietnamese Activists Hit With Malware: Google As it continues to spar with the Chinese government over Internet censorship, Google warns of an apparently unconnected attack in the region targeting Vietnamese activists. |
InternetNews June 8, 2010 |
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats. |
National Defense January 2016 Allyson Versprille |
Fragmented Cyber Legislation Hinders Military The patchwork of legislation that allows the U.S. military and government to perform cyber operations is too disjointed to enable an effective and swift response, a former Army officer said. |
InternetNews August 3, 2010 |
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
InternetNews October 9, 2009 Larry Barrett |
Cyber Terrorism Demands New Tactics: Study RAND Corporation says fighting online threats to national security requires nontraditional tactics, immediate attention. |
InternetNews January 15, 2010 Larry Barrett |
Russia Blamed for 13% of Global Cyber Attacks New report from Akamai awards Russia the dubious distinction of world's leading source of cyber threats. |
Bank Technology News May 1, 2008 Rebecca Sausner |
Homeland Security: Manhattan Project for Cyber Sec The federal government has begun to offer details on an expensive, and targeted, defensive cyber-security plan to protect our nation's financial markets. |
Insurance & Technology November 5, 2008 Peggy Bresnick Kendler |
Virtual Roundtable: Online Risk Industry experts discuss how to manage the risks, liabilities, and solutions associated with electronic processes and interactions related to conducting business over the Internet. |
Chemistry World June 10, 2015 Emma Stoye |
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. |
CIO August 27, 2010 Kim S. Nash |
Richard Clarke: Your Company Is a Front in a Future Cyberwar Former White House cybersecurity adviser Richard Clarke thinks the government should do more to defend companies against cyber-threats. |
Insurance & Technology November 5, 2008 Prasad Balakrishnan |
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. |
InternetNews November 29, 2007 |
World Faces 'Cyber Cold War' Threat Cybercrime is no longer just a threat to industry and individuals but increasingly to national security. |
National Defense December 2010 Stew Magnuson |
Pentagon Criticized For Not Doing More to Protect Homeland From Cyberattacks Neither the Pentagon nor the U.S. government has anything resembling a strategy when it comes to protecting the nation's computer networks. |
National Defense October 2007 Breanne Wagner |
Cyber Attacks in Estonia Serve as Wake-Up Call The attacks compromised both public and private websites and sent a wave of panic through a country that is known for being especially "wired." |
InternetNews July 14, 2009 |
Inside Korea's Cyber Attack What really happened in South Korea? Attackers used the country's high-speed network against itself. |
Science News April 25, 2009 |
Science Past From The Issue Of April 25, 1959 There appears to be a strong link between the behavior of a man with regard to his business and social activities and his chances of being a victim of a heart attack. |
InternetNews September 14, 2006 Roy Mark |
U.S. Unprepared for Internet Attack Recovery Cyber security experts cite lack of leadership from government and cooperation from private sector. |
Military & Aerospace Electronics February 2010 John Keller |
DARPA moves ahead with National Cyber Range project for advanced cyber security research The U.S. Defense Advanced Research Project Agency in Arlington, Va., is awarding multimillion-dollar contracts to two research organizations to build prototype advanced computing centers to demonstrate and test cyber security, defensive information warfare, and information assurance technologies. |
The Motley Fool April 22, 2009 Rich Smith |
Grand Theft Fighter Jet: China According to the Wall Street Journal, someone -- apparently based in China -- has succeeded in penetrating the IT systems at key U.S. defense contractors, making off with "several terabytes" worth of data on Lockheed Martin's new F-35 Lightning II fighter jet. |
National Defense January 2005 Joe Pappalardo |
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. |
National Defense May 2004 Frank Colucci |
Air Force Refines Training Programs for UAV Operators With growing numbers of Predator and Global Hawk unmanned aircraft expected to enter service in the years ahead, the U.S. Air Force is solidifying plans to train operators and support crews. |
InternetNews July 14, 2005 Roy Mark |
Cyber Security Gets Limelight in DHS Reorg Chertoff's organizational changes call for new cyber security position and increased information sharing. |
National Defense August 2015 Sandra I. Erwin |
Dirty Little Secrets of the Cyber Business The federal government can be the ticket to prosperity. Not so much for the amount of money it spends, but because government networks are ground zero for the cyber wars that are being fought on a daily basis. |
InternetNews January 15, 2010 David Needle |
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. |