Twitter, in a much-needed move to keep its users safer from cyberattacks, is introducing a more secure login process. The system, called Login Verification, gives users the option to have a verification code sent to their mobile phone ...
Tags: Twitter, Sign-in, Computer Products
China's remarkable success at infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology expertise. State-sponsored hacking ...
Tags: Computer Products, Hackers, networks
Four British men associated with the LulzSec hacker collective received prison sentences Thursday for their roles in cyberattacks launched by the group against corporate and government websites in 2011. Ryan Cleary , 21, Jake Davis, 20, ...
Tags: Computer Products, LulzSec hacker
Bitcoin is not going away, the digital currency's developers say, and they're craving more technically savvy people to support its use. "Our bottleneck is not new code, it's code review and testing," said Gavin Andresen , chief scientist ...
A bill proposed in the U.S. Senate aims to block imports of products containing U.S. technology stolen online, a move that appears primarily directed at China. Introduced by four senators, the Deter Cyber Theft Act would require the U.S. ...
Tags: Computer Products, software
Two U.S. senators will push Congress or President Barack Obama's administration to pursue trade and immigration sanctions against China and other countries that allegedly support cyberattacks on U.S. government agencies and businesses, the ...
Tags: Support Cyberattacks, Barack Obama
Chinese cyber espionage activities are fueling a rapid modernization of the country's defense and high tech industries, the Pentagon said in an unusually candid assessment of China's military and security developments last year. In a ...
Tags: Computer Products, Pentagon
China's government and military appear to be directly involved in cyber-attacks against the U.S., according to a report released Monday by the U.S. Department of Defence. The conclusion, contained in an?annual report?evaluating China's ...
Tags: Pentagon, Cyberattacks, Computer Products
The Hartford Steam Boiler Inspection and Insurance Company (HSB) has launched a new cyber risk insurance coverage to safeguard smaller commercial organizations from growing information security exposures threats. Providing broad coverage ...
Tags: HSB, Cyber Attacks
The U.S. House of Representatives has voted to approve a controversial cyberthreat information-sharing bill, despite opposition from the White House and several privacy and digital rights groups. The House on Thursday voted 288-127 to ...
Tags: CISPA, Privacy Objections
The U.S. House of Representatives moved closer Wednesday toward the passage of the Cyber Intelligence Sharing and Protection Act (CISPA), despite concerns that the cyberthreat information-sharing bill will allow Web-based companies to share ...
Tags: Computer Products, CISPA
The largest Bitcoin exchange in the U.S., BitFloor, has closed again, this time due to issues with its bank account, according to its founder. Roman Shtylman wrote that the exchange's "US bank account is scheduled to be closed and we can ...
Tags: Computer Products, software
A U.S. House of Representatives committee failed to make the changes necessary to allay fears about government surveillance in a controversial cyberthreat sharing bill that's moving toward a House vote, critics said. The House ...
Tags: CISPA, Surveillance Bill
The US government plans to reinforce its cybersecurity programme by expanding web monitoring, using a process which currently scans traffic going in and out of defence contractors and expanding it to private firms. That means employees of ...
Tags: US, Computer Products, web monitoring
Cyberattacks are near the top of the list of most serious threats facing the U.S., with the rivaling concerns about terrorism and North Korea, intelligence officials with President Barack Obama's administration said. James Clapper, the ...
Tags: cyberattack, private networks, networks