China denies stealing Designs of U.S. Jet Fighter F-35 Stealth


Once again NSA whistle blower from 2010, Snowden is in the news, claiming that U.S. jet fighter F-35 Stealth designs were stolen by China.On Sunday, Der Speigel a German Magazine published documents...

NSA spying on North Korean Networks before Sony Attack


American officials had accused North Korea for the damaging cyber-attack on Sony Pictures Entertainment in November. It now seems why the American officials had done so. It seems that the National...

China to play an important role in the Sony-North Korean Cyber Attacks


Since the declaration of North Korea disapproval of the Sony Pictures upcoming comedy The Interview starring James Franco and Seth Rogen, a lot has happened. The most important being a group of...

FBI announces that North Korea Hacked Sony


FBI has now issued a statement saying that they have confirmed that North Korea is behind the attack on Sony Pictures Entertainment. Previously the FBI only stated that North Korea is a prime suspect...

Sony Pictures employs Services of Mandiant after Cyber Warfare


Sony Pictures sought the help of FireEye’s Mandiant to clean the mess left behind after a huge cyber warfare that left its computer network in a state of inertness. The FBI is currently looking into...

Israeli’s Cybereason: Sniffing for Malicious Operations


Thankfully, in spite of the media buildup going into the Sochi Olympics of 2014, the Games looks like it will wrap up  without a serious a security hitch (well, if you exclude Russia losing to...

Govt report: Cyberattacks not coordinated


WASHINGTON (AP) — A multi-agency government task force looking into cyberattacks against retailers says it has not come across evidence suggesting the attacks are a coordinated campaign to adversely...

First documented cyber attack of smart appliances unveiled


We all hate spam and the extra effort required to find important items in the glut of emails we get. A company called Proofpoint has published a report that claims to show the first documented case...
    






The Year Ahead In Cyber Security: What You Need To Know


2013 was a watershed year for cyber security and digital secret-keeping. Revelations about the way our data is treated once it leaves our browsers and mobile devices, the actions of hacker...