Researchers have uncovered an active phishing campaign which targets Android devices in order to turn them into mobile proxies.
CS Digest Section: Most Popular
A new Navy policy recognizes the electromagnetic spectrum as a warfighting domain "on par with sea, land, air, space and cyber."
A "red teamer" cracked into a US Department of Defense system and rebooted it, but nobody noticed: the system suffered unexplained crashes. In another case, testers "caused a pop-up message to appear on users' terminals instructing them to insert two quarters to continue operating."
The leaders of two contenders for the Pentagon's massive cloud contract sounded off on Google's decision not to bid.
Most of us have been trained to be wary of clicking on links and attachments that arrive in emails unexpected, but it's easy to forget scam artists are constantly dreaming up innovations that put a new shine on old-fashioned telephone-based phishing scams. Think you're too smart to fall for one? Think again: Even technology experts are getting taken in by
A former employee of the U.S. National Security Agency (NSA) received a five-year prison sentence for retaining classified national defense information.
Facebook revealed more details about how hackers exploited three distinct bugs to get the ability to control up to 50 million users' accounts.
Olle and his fellow cyber security consultant Pasi Saarinen recently discovered a new way to physically hack into PCs. According to their research, this method will work against nearly all modern computers. This includes laptops from some of the world's biggest vendors like Dell, Lenovo, and even Apple.
Cybersecurity is unique compared to most other business operations, even most IT operations. Unlike marketing or network management-both of which tackle difficult and ever-changing challenges in the business operating environment-cybersecurity pits defenders against intelligent, creative and deliberate opponents.
The Army is looking to build up and resource expeditionary cyber teams that will conduct cyber effects at the tactical edge.