Search results

Spies targeting Saudi Arabia switched tactics after Symantec exposed them, report says

by Jeff Stone • 19 hours ago

APT33, also known as Elfin and Refined Kitten, "appears undeterred following previous exposés of their activity," Recorded Future said.

Gift-card scheme went well beyond Wipro hack, RiskIQ reports

by Sean Lyngaas • 23 hours ago

RiskIQ has found at least five different attack campaigns tied to the perpetrators of the apparent Wipro breach.

Elizabeth Warren wants to overhaul U.S. election security

by Shannon Vavra • 1 day ago

Sen. Elizabeth Warren, who is running for president in 2020, wants to replace outdated voting systems with voter-verified paper ballot machines, mandate voting equipment be paid for by the federal government, and require risk-limiting audits before elections take place.

Senate investigation finds agencies 'unprepared' to protect Americans' data

by Sean Lyngaas • 2 days ago

Lessons from the 2015 OPM hack still haven’t been heeded, according to a Senate subcommittee.

Russia's trolling tactics are getting more elaborate

by Shannon Vavra • 2 days ago

The Russian-linked actors are trying to spread fake tweets tied to Marco Rubio and UK government officials.

Chinese spies have been sucking up call records at multinational telecoms, researchers say

by Sean Lyngaas • 3 days ago

The hacking campaign has breached about 10 cellular providers in Africa, Europe, the Middle East and Asia, according to Cybereason.

Facebook fails to kill class-action lawsuit over data breach

by Jeff Stone • 3 days ago

Judge William Alsup warned Facebook he would authorize a “bone-crushing” discovery process on behalf of affected users.

NSA technical director: Iran-linked operations are about espionage, not destruction

by Shannon Vavra • 5 days ago

The country is getting better at attacks, but not yet to the point where it can cause physical damage.

The NSA is experimenting with machine learning concepts its workforce will trust

by Shannon Vavra • 6 days ago

NSA brass wants to increase the agency's use of AI in defensive and offensive operations.

What happens when one APT hijacks another’s infrastructure

by Sean Lyngaas • 7 days ago

Servers, domains and other infrastructure are a contested resource like any other on the internet.

TwitterFacebookLinkedInRedditGoogle Gmail