Items tagged with cyber-attacks
by
Nathan Wasson - Wed, May 25, 2022
Research from earlier this year showed that hackers can remotely unlock and start Honda and Acura vehicles by exploiting a vulnerability in the remote keyless system. However, cybercriminals targeting the automotive industry don’t have to...
Read more...
by
Nathan Ord - Wed, Jun 02, 2021
Though industrial cyberattacks, such as those on JBS Global or Colonial Pipeline, are on the rise, the problem is not exclusive to businesses. According to new research, consumer cyber threats jumped nearly 83% in 2020. With new types of...
Read more...
by
Paul Lilly - Mon, Apr 25, 2016
In an attempt to kill Saddam Hussein and intimidate the enemy, United States military forces conducted a shock and awe campaign that saw a barrage of bombs dropped on Baghdad and other parts of Iraq over a decade ago. Fast forward to today...
Read more...
by
Joshua Gulick - Wed, Apr 01, 2015
President Obama signed an executive order today that declares cyberattacks from foreign soil to be a national emergency and gives the United States new powers for defending against them. The executive order, titled “Blocking The Property...
Read more...
by
Paul Lilly - Thu, Feb 28, 2013
Apparently still fuming over a recent report by an American cyber security company blowing the whistle on Chinese government-sponsored hacking groups, China's Ministry of Defense says its military sites are frequent targets of attack...
Read more...
by
Jennifer Johnson - Mon, Oct 08, 2012
According to new research sponsored by HP, the cost and frequency of cybercrime has increased for the third straight year. The third-annual Cost of Cyber Crime Study shows the occurrence of cyberattacks has more than doubled since 2010...
Read more...
by
Paul Lilly - Wed, Oct 03, 2012
The web is a dangerous place, and one of the threats that emerged in 2011 was that of malnets, or malware networks, which are just what they sound like. These infrastructures are designed to last beyond a single attack and allow cybercriminals to adapt to new vulnerabilities and launch malware...
Read more...