Air Force reclassification of cyber tools as weapons sparks speculation
One expert suggests the move is designed to deter nations from launching cyberattacks. Another: To drum up funding support from Congress
John P. Mello | 12 Apr | Read more
One expert suggests the move is designed to deter nations from launching cyberattacks. Another: To drum up funding support from Congress
John P. Mello | 12 Apr | Read more
Greater adoption of two-factor authentication is a step in the right direction, said one security expert of Microsoft's reported move
John P. Mello | 11 Apr | Read more
Intruders finding 'weakest link' the best route into the information treasures of large companies
John P. Mello | 10 Apr | Read more
US-CERT find leads to concerns across a broad array of industries, including military and hospitals
John P. Mello | 09 Apr | Read more
Dean admits she failed to report additional searches to higher-ups
John P. Mello | 03 Apr | Read more
Junksters exploit Search Giant's good name to whitewash malicious messages
John P. Mello | 02 Apr | Read more
Effective program needed to secure about 14,000 mobile devices at West Point and Corps of Engineers, Inspector General report says
John P. Mello | 02 Apr | Read more
Spamhaus blacklisting of Dutch company results in cyberattack of historical proportions
John P. Mello | 27 Mar | Read more
While not your typical cyberattacker, however, they're more likely to engage in criminal online behavior than non-gang peers, researchers note
John P. Mello | 27 Mar | Read more
Lock screen bypass lets intruder dial any number and run any app
John P. Mello | 20 Mar | Read more
Cyberspace offers crime groups better networking, expanded pool of victims
John P. Mello | 19 Mar | Read more