A draft report from the US-China Economic Security and Review Commission indicated that China is becoming the “most threatening actor in the cyberspace.” According to the report, the hackers in China and its intelligence community are increasingly using advanced techniques and equipment, such as apertures and sensors to infiltrate the military computers of the United States, including its defense contractors.
As Iranians mark the 1979 seizure of the U.S. Embassy in Tehran, few are much concerned about who wins the U.S. presidential race.
Iran may be a major foreign policy issue in U.S. presidential politics, but few attendees at an Iranian government-organized rally Friday denouncing the United States seemed concerned about the outcome of the upcoming American election.
London (CNN) -- The UK government Tuesday blocked the extradition of computer hacker Gary McKinnon to the United States to face trial for what the U.S. government says is the biggest military computer hacking of all time.
Home Secretary Theresa May said McKinnon was accused of serious crimes -- but that "there is also no doubt that he is seriously ill."
As the conflict in Syria intensifies, it seems that the violence has filtered into all aspects of life including the Internet. One example of that is a spate of new videos linked to the unrest, offering training on how to use Kalashnikov assault rifles. As RT's Sara Firth reports, many are wondering who put them up, and why they haven't been taken down..
The DoD Cloud Computing Strategy introduces an approach to move the Department from the current state of a duplicative, cumbersome, and costly set of application silos to an end state which is an agile, secure, and cost effective service environment that can rapidly respond to changing mission needs.
Increased mission effectiveness and operational efficiencies are key benefits that can be achieved with cloud computing. Cloud computing will enable the Department to consolidate and share commodity IT functions resulting in a more efficient use of resources.
On June 24, with little fanfare, Stuxnet died. The malware exposed as being a government project aimed at slowing Iran’s nuclear intiatives, stopped replicating. Despite a reported link to a plant shutdown in Iran, the state run media called Stuxnet a failure.
We have seen several cyber weapons in the public. Some of these cyber weapons are used to collect information and some cyber weapons are used to sabotage "specific" targets. Stuxnet is one of the cyber weapons that has been in wide publicity, yet it was just last month that the New York Times had published that Stuxnet malware was used by the United States and Israel.