List of Cyber Security & Hacking articles
-
Paul Whelan, an American detained by Russian authorities and accused of espionage. (Photo courtesy of the Whelan family) U.S. Citizen Held in Moscow Not Likely a Spy
Arrest could be retaliation for U.S. conviction of Russian national in influence operation.
-
U.S. Deputy Attorney General Rod Rosenstein speaks as FBI Director Chris Wray and Assistant Attorney General for National Security John Demers listen during a news conference to announce a China-related national security law enforcement action at the Justice Department in Washington on Dec. 20. (Alex Wong/Getty Images) The United States v. Godkiller (et al.)
U.S. prosecutors indict two Chinese nationals in huge hacking campaign.
-
Social_WarringStates-2000px The War-Torn Web
A once-unified online world has broken into new warring states.
-
Sen. Dianne Feinstein (D-Calif.) walks with Sens. Kamala Harris (D-Calif.) and Mark Warner (D-Va.) to a Senate Select Committee on Intelligence closed-door meeting at the U.S. Capitol in Washington on April 27, 2017. (Mark Wilson/Getty Images) Senate Bill Targets Chinese Economic Espionage
New measure would give U.S. prosecutors power to indict hackers working abroad.
-
The logo of Chinese electronics company Huawei on Sept. 2, 2015 in Berlin. (John Macdougal/AFP/Getty Images) Germany Is Soft on Chinese Spying
Huawei has deep ties to the Chinese government. Berlin might let it build the country’s next generation of communications infrastructure anyway.
-
A man reads Czech newspaper Lidove Noviny in a shop in Prague on March 21, 2011. (Michal Cizek/AFP/Getty Images) How an Internet Impostor Exposed the Underbelly of the Czech Media
When politicians own the press, trolls have the last laugh.
-
Pedestrians walk past ATMs for the digital currency bitcoin in Hong Kong on Dec. 18, 2017. (Anthony Wallace/AFP/Getty Images) Can the U.S. Sanction What It Can’t Find?
Authorities are trying to force bitcoin into the light but cryptocurrencies are only getting harder to trace.
-
Facebook chief operating officer Sheryl Sandberg and Twitter chief executive officer Jack Dorsey testify during a Senate Intelligence Committee hearing on Capitol Hill, September 5, 2018 in Washington, DC. (Photo by Drew Angerer/Getty Images) The Internet Is Going To End Up Like Greece
When the big players get away with open fraud, trust disintegrates.
-
An Iranian traveler arrives at a bus terminal in Tehran on Jan. 13. (Atta Kenare/AFP/Getty Images) The App Destroying Iran’s Currency
Iranians are using the messaging app Telegram to spread fake news about the rial—and make a profit for themselves.
-
Media gathered in front of WikiLeaks founder Julian Assange at the Ecuadorian Embassy in London on May 19, 2017. (Jack Taylor/Getty Images) How Would U.S. Prosecutors Go After Assange?
Prosecuting the WikiLeaks founder raises hard questions about U.S. press freedom that may not, at present, be answerable.
-
Russian President Vladimir Putin appears on a computer screen in an internet cafe in Moscow on July 6, 2006. (Denis Sinyakov/AFP/Getty Images) Battling the Bots
Analysts are increasingly using artificial intelligence to track Russian disinformation campaigns.
-
A member of the Metropolitan Police SWAT team patrols a movie theater before a showing of the film "The Interview" on December 25, 2014 in Washington, DC. In Cyberwar, There Are Some (Unspoken) Rules
A recent article argues that the lack of legal norms invites cyberconflict. But governments know the price of overreach and are refraining from unleashing their full capabilities.
-
A person walks past a 12-story building alleged in a report on Feb. 19, 2013, by the internet security firm Mandiant as the home of a Chinese military-led hacking group after the firm reportedly traced a host of cyberattacks to the building in Shanghai's northern suburb of Gaoqiao. (Peter Parks/AFP/Getty Images) In Chinese Spy Ops, Something Old, Something New
Indictments reveal how Beijing mixes traditional spycraft with cyberespionage to steal U.S. technology.
-
A security official waits in front of the door of the Saudi Arabian consulate in Istanbul on Oct. 17. (Ozan Kose/AFP/Getty Images) The Kingdom’s Hackers and Bots
Saudi Arabia is using cutting-edge technology to track dissidents and stifle dissent.
-
Demonstrators rally outside the Federal Communications Commission building to protest against the end of net neutrality rules in Washington on Dec. 14, 2017. (Chip Somodevilla/Getty Images) Net Neutrality’s End Will Let Power Eat the Internet
Information is getting more centralized as online norms fracture.