The representatives of the Utah State confirmed that their systems experiences 300,000 hacking attacks a day due to the presence…
In May 2015, the Chinese security firm Qihoo 360 published a report on a Trojan called OceanLotus that was being…
A new documentary titled Zero Days revealed that the Stuxnet cyber weapon was just a small part of a much…
Malware researchers at PaloAlto discovered the Fysbis Trojan, a simple and an effective Linux threat used by the Russian cyberspy…
The British Intelligence Agency GCHQ has a license to hack computers and devices, the UK's Investigatory Powers Tribunal (IPT) ruled. This…
Experts at Trend Micro discovered strains of BlackEnergy malware involved in the recent attacks against Ukrainian Mining and Railway Systems.…
The FBI requests $38 Million to counter the threat of Going Dark, in particular asking more economic resources to break…
According to Fox News, the Director of National Intelligence confirmed to the Senate that the Islamic State has used chemical…
In the following brief I will describe kinetic plot based modern terrorism/Cyber-terrorism and religious affiliations. Both Jihadist and Non-Jihadist, organized…
The US and UK authorities are working on a secret agreement that would allow a mutual access to data of…
This website uses cookies.