Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
As part of GIJN's organized crime series, we look at the world of cybercrime and the dark web and provide tips on how to investigate it. → Read More
The U.S. Justice Department announced Monday that it has indicted four members of China's military for the cyberattack against credit ratings agency Equifax in 2017. → Read More
In a letter Thursday, the GAO said DHS's Cybersecurity Infrastructure Security Agency (CISA) is behind on its plans for elections security, a mandate the agency took on in early 2017, when election infrastructure was added to its list of "critical" industries with which it should coordinate a response to cyberattacks. → Read More
Iowa caucus debacle is one of the most stunning IT resiliency failures ever → Read More
The 2015 Ashley Madison breach affected individuals with corporate and government email addresses, which could make them particularly vulnerable to bribery. → Read More
The U.S. Justice Department announced its first-ever enforcement action against telecommunications companies over robocalls, the agency announced Tuesday. → Read More
An organization known as "Our Mine," allegedly based in Saudi Arabia, took responsibility for the attack. → Read More
The Food and Drug Administration released a warning on Thursday to healthcare providers, facilities and consumers about a vulnerability in certain electronic health care data equipment made by General Electric. → Read More
The report shows how outsiders can monitor seemingly private phone messages. However, while tools like those described in the report exist, they are costly and rarely used against normal citizens. → Read More
Fears over the misuse of internet connected cameras like those made by Nest and Ring has combined with the powerful and simple email scam known as "sextortion." → Read More
The cooperation is a departure from past interactions between the NSA and major software developers like Microsoft. In the past, the top security agency has kept some major vulnerabilities secret in order to use them as part of the U.S. tech arsenal. → Read More
The FBI wants access to the phone of Mohammad Alshamrani, who is suspected of killing three people in a shooting spree on a Naval base in Pensacola, Fla. on Dec. 6, 2019. → Read More
U.K.-based currency exchange company Travelex experienced a ransomware attack that crippled the company's online presence and locations across the U.S., European Union and Asia. → Read More
City governments, agencies and companies are on high alert for ramped-up cyber activity possibly emanating from Iran. But attacks to a handful of websites across the globe, purportedly in the name of Iranian activists groups, aren't cause for much concern and can't truly be attributed to Iran in the short term. → Read More
Rising tensions with Iran are worrisome because Iran has previously conducted widespread cyberattacks against U.S. businesses in response to U.S. government action, experts told CNBC. → Read More
Of the trillions of threats this decade, and the billions of breaches, and the thousands of those breaches that actually made it to the news, here are the six incidents that really mattered. → Read More
After a series of widespread cyberattacks in Louisiana, which led to two statewide emergency declarations this year, New Orleans was hit on Friday. → Read More
Theft of unencrypted hard drives from a Facebook employee's car led the company to announce another privacy and security incident to its employees. For a number of reasons, however, the employees probably shouldn't worry, and the public probably shouldn't be surprised. → Read More
Brooklyn prosecutors said in november that a Lithuanian man and an unknown co-conspirator emptied the brokerage accounts of hapless victims of hundreds of thousands of dollars. → Read More
Here's how to respond to five of the most common scams that might strike you or a loved one over the holidays depending on what the crooks got: Your Social Security Number, your bank account or credit card, access to your hardware or files, your pride or, worst of all, your hard-earned money. → Read More