Dan Coats says the danger signs are as serious as warnings before 9/11.
Nakasone replaces Admiral Mike Rogers, who is retiring after nearly four years in the “dual-hat” position leading the NSA and the military’s cyber warfare division.
What if someone infiltrated our nuclear command and control so that if we pushed the button, nothing happened? Or if something did happen even without our pushing the button? What if Pakistan did this to India, or India to Pakistan?
Walls defended cities for millennia against attacks from invading armies. Their worth was proven time and again. It was safer
As the Internet spreads its tentacles into every nook of society, attacks are rapidly increasing against individuals, companies, governments, and the very Net infrastructure upon which they all rely. The attackers range from cyber criminals to non-state actors like ISIS and nation-states. But law enforcement, government regulation, and military response are not keeping up.
In this three-part video series, you'll hear from some of the giants in the Internet and cyber security fields as they relate stories of cybercrime becoming a worldwide business, privacy becoming an antiquated idea, the discovery of Stuxnet and the real possibility of cyber warfare.
Quantum computers are already here in a limited form, and fully functional versions are on the way. They will be as transformative for mankind as were the mainframe computers, personal computers, and smartphones that we all use. As do all advancing technologies, they will also create new nightmares. The most worrisome development will be in cryptography.
If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.
The President will discuss cybersecurity as part of the State of the Union address. He wants "companies to share threat information with homeland security" in exchange for “targeted liability protection.” What does this mean for Americans?
The title of Ron Deibert's is a bit of a recycling job. He first used "Black Code" as the title of a 2002 article, then "Black
Deibert's Citizen Lab, based at the University of Toronto, tries to shed light on this increasingly complex shadow world
"It's about how we tell the narrative from the beginning, so that we're not setting people up to think we're going to win
It also does not conclude where to draw the line in terms of when a hacker becomes fair game. "The law is unclear as to the