-
In December 2017, the Russia-based cybersecurity firm Kaspersky Lab filed suit against the Department of Homeland Security over an order labeling Kaspersky software an “information security risk” and ord...
-
The Russian information-operation strategy can be summed up as “chaos monkeys”: agents seeking to destabilize the United States by exploiting fissures in our society. The Mueller indictments announced Fr...
-
On Feb.
-
“We are truly fucked.” That was Motherboard’s spot-on reaction to deepfake sex videos (realistic-looking videos that swap a person’s face into sex scenes actually involving other people). And that sleazy...
-
On Friday, Special Counsel Robert Mueller released the indictment of the "Internet Research Agency LLC," also known as the Russian troll factory, and a number of other entities and individuals.
-
The encryption debate dates back to Clinton administration proposals for the “clipper chip” and mandatory deposit of decryption keys. But that debate reached new prominence in connection with the FBI’s e...
-
On Wednesday, House Democrats' Congressional Task Force on Election Security released a report urging action on election security in advance of this year's midterm elections. Reps. Bennie Thompson and Ro...
-
In November 2016, the U.K. government launched its Active Cyber Defence (ACD) program with the intention of tackling “in a relatively automated [and transparent] way, a significant proportion of the cybe...
-
In the early hours of Saturday morning, an Iranian unmanned aerial vehicle entered Israeli airspace close to the Syrian border. Israel shot down the UAV and responded by attacking the command vehicle, de...
-
On Feb. 8, 11 U.K. Members of Parliament came to Washington to grill witnesses from U.S.-based technology companies as part of a inquiry into “fake news” by the Digital, Culture, Media and Sport Committee.
-
PDF Version
-
A recent New York Times article on cyber crime told not the sort of data-breach story with which readers have become familiar but, instead, focused on vast unknowns in the sphere of cyber crime.