Tags » Cyber

CIA says Russia intervened to help Trump win White House -- And not just to undermine confidence in the U.S. electoral system

Fri Dec 9, 2016 | 10:16pm EST

Reuters

Julian Assange, Founder and Editor-in-Chief of WikiLeaks speaks via video link during a press conference on the occasion of the ten year anniversary celebration of WikiLeaks in Berlin, Germany, October 4, 2016. 498 more words

While You Were Sleeping: 5 stories you might have missed, Dec 10 edition

(Source: www.straitstimes.com)

Obama orders review of cyber attacks on 2016 election

US President Barack Obama has ordered intelligence agencies to review cyber attacks and foreign intervention into the 2016 election and deliver a report before he leaves office on Jan 20, the White House said. 522 more words

Current Affairs

Obama orders review of cyber attacks on 2016 election

(Source: www.straitstimes.com)

WASHINGTON (REUTERS) – US President Barack Obama ordered intelligence agencies to review cyber attacks and foreign intervention into the 2016 election and deliver a report before he leaves office on Jan 20, homeland security adviser Lisa Monaco said on Friday (Dec 9). 244 more words

Current Affairs

SitRep: U.S. Officials Eying New Russian Capabilities in Syria, Ukraine; China Pushes Back Against Trump

Beijing rules. Less than 24 hours after U.S. President-elect Donald Trump fired off a pair of provocative tweets denouncing Beijing’s trade policies and defending his surprising phone call with Taiwan’s leader, China stepped into the arena. 1,532 more words

The Cable

Virtual strategies for guys

Shy guys were reborn with appearance of internet. Finally, they don’t need to approach in reality to thousand girls, and to risk rejection. All what they need is to open computers, to make account at social networks and their problem is solved. 786 more words

Relations

The Ins and Outs of Cyber Extortion Insurance Coverage

James S. Carter

According to FBI data, cyber-criminals are on pace this year to collect approximately $1 billion through cyber extortion. This is a practice in which extortionists threaten to cripple a computer system or obtain and/or release confidential information unless their demands (usually for money) are satisfied. 2,249 more words

Cybersecurity

A Brief History of the Future of Network Security Part 2: Emerging Threats

This is the second post in a three-part Blog series on Network Security

Carl B. Forkner, Ph.D.

Emerging Threats: Timeline and Lifecycle

Contemporary and future threat landscapes are dynamic and often include unforeseen technological advances. 863 more words

DWWTC