Michelle Obama, the U.S. first lady, may have been a victim of hacking, according to TMZ. Barack Obama, U.S. president, said that he does not confirm the hacking of the First lady, but he does confirm that cyber security is a real threat for everyone. He will meet with business CEOs Wednesday to discuss cyber security.
President Barack Obama can authorize a pre-emptive cyber-attack if U.S. intelligence gains enough evidence of another country or group’s plans to launch its own attack against American interests.
Huawei, China’s telecom juggernaut, is facing growing scrutiny over espionage concerns in the United States and will likely be locked out of bidding on a critical new government computer network in Canada.
The Epoch Times Chinese website has been repeatedly attacked over the last week by hackers based in China, according to the company’s technical personnel.
The U.S. power grid remains too vulnerable to cyber-attacks and other potential threats despite efforts to set up more efficient security systems, lawmakers heard on July 17.
With tax season underway, the Internal Revenue Service (IRS) identified identity theft and phishing—a deceitful practice involving the extracting of passwords and other personal information via fake emails and website.
One of the first major battles of cyberterrorism is taking place between Israeli, Iranian, and Saudi Arabian hackers who are dumping credit card data belonging to innocent bystanders by the tens of thousands.
Ten consumer and privacy advocacy groups sent a letter to the U.S. Federal Trade Commission (FTC), asking it to investigate Facebook’s use of supercookies.
Thousands of websites were compromised after hosting provider InMotion was hacked in the past week, raising new concern over the vulnerability of Web hosts to cyberattacks.
Security researcher and Type 1 diabetic Jerome Radcliffe demonstrated a potentially lethal vulnerability in wireless medial devices by hacking his own insulin pump and glucose meter—showing a live audience that a malicious hacker could potentially use security gaps in the devices to end someone’s life.
There’s an interesting dynamic taking place between where technology is heading and how governance is keeping up. A few topics come to mind—piracy and hackers being toward the top of the list.