The US Air Force Intranet Control (AFINC) Weapon System reached full operational capability this month. This is the first cyberspace weapons system to reach...
According to the US Department of Homeland Security, the number of investigations into cyber attacks on the America’s critical manufacturing sector nearly doubled last...
ISIS is known for its strong affinity to modern technological solutions, using encrypted apps like Telegram to communicate in secret from prying eyes, and...
Computer vision has made great strides over recent years. Machines can now recognise objects nearly as well as humans. However, the similarity does not...
Two German researchers recently ran an analysis of North Korea’s homegrown operating system, Red Star OS. Turns out, Red Star mirrors quite closely the...
A second high-ranking American intelligence official has had his personal accounts breached in roughly three months.
The personal online accounts of James Clapper, director...
Top officials of the Obama administration have met leading Internet companies in Silicon Valley in an effort to build cooperation with them in combating...
Yahoo is now starting to warn users if they’ve been targeted by state-sponsored hackers, following similar moves by Google, Facebook, and Twitter.
The announcement came...
Researchers at the Computer Science and Artificial Intelligence Laboratory (CSAIL) at the Massachusetts Institute of Technology (MIT) have developed a new online text messaging...
Researchers from the Centre for Security Communication and Network Research (CSCAN) at Plymouth University have developed a new system for secure, multi-level authentication that...
Criminals are earning around $70 million a year by installing malware on users’ devices, a new study RiskIQ study reveals.
The “Digital Bait” study,...
One of the most popular gifts this year is the Hello Barbie, an internet-connected doll that actively listens and responds to children, using fairly...