Microsoft identifies a destructive malware operation targeting Ukrainian organizations; the malware looks like ransomware but lacks a ransom recovery mechanism
European Union simulated a cyber attack on a fictitious Finnish power company Vilius Petkauskas / cybernews.com : Belarus state hackers suspected behind Ukraine cyberattack Grugq / grugq's domain : Uk...
Recent cyberattacks on Iran's fuel distribution system and an Israeli LGBTQ dating site show that Iran-Israel cyberwar is impacting civilians on a large scale
Iranians couldn't buy gas. Israelis found their intimate dating details posted online. The Iran-Israel shadow war is now hitting ordinary citizens. Tweets: @alexgibneyfilm , @ebkania , @chris_sactoc...
Current and former insiders shed light on IBM's missteps with Watson, as IBM takes a less ambitious approach to commercializing Watson in the corporate market
IBM's artificial intelligence was supposed to transform industries and generate riches for the company. Neither has panned out. Tweets: @counternotions , @leapingrobot , @scottnations , @patentology ...
Sources: state-sponsored hackers accessed US DHS internal communications as part of the campaign that penetrated US Treasury and Commerce departments
now five — hacked in major Russian cyberespionage campaign David Uberti / Wall Street Journal : Hack of Federal Agencies Shows Cyber Dangers to Supply Chains Tweets: Dustin Volz / @dnvolz : Can confir...
A look at “perception hacks”, small attacks that can undermine confidence if exaggerated, and other scenarios that election officials are keeping an eye on
perception hacks are designed to trick us into thinking there has been widespread manipulation when there hasn't. The threat actors will keep trying, but we don't have to take the bait! https://www.ny...
A look at the history of cyberattacks between US and Iran as the US Cyber Command seeks a process of deterrence to curb future Iranian retaliation
after one launched against Iran just three months ago — has emerged as the most appealing course of action for President Trump, who is reluctant to widen the conflict in a region he has said the Unite...
Malware attack raises concern that the NSA has lost control over cyberweapons they developed, and that damage from the Shadow Brokers leaks could be much worse
Twice in the past month, National Security Agency cyberweapons stolen from its arsenal have been turned against two very different partners … Tweets: @xor , @counternotions , @privacyint , @nicoleperl...