A cyber-espionage group linked to the Russian military has developed Android malware which it used to infect the smartphones of Ukrainian soldiers and track Ukrainian field artillery units, according to a report released today by Crowdstrike.
According to statements from Ukrenergo, a Ukrainian energy provider, a cyber-attack may have caused a power outage in northern Ukraine, almost a year after another cyber-attack had shut down power supply across several regions during Christmas 2015.
Direct access to the Tor network and some high-profile VPN services have been blocked in Turkey, reports TurkeyBlocks, a service that keeps track of websites and services banned in the country.
A Russian-speaking hacker has breached the servers of the US Election Assistance Commission (EAC) and is now selling access to these accounts.
The Russian Parliament is working on a new law that would introduce criminal liability for hackers creating tools and participating in cyber-attacks against Russian infrastructure.
The Canadian government is asking citizens for their feedback on several privacy and cyber-security topics, as part of a public consultation period for upcoming changes to Canada's national security framework.
As of December 1, 2016, US law enforcement has gained new hacking powers thanks to changes to Rule 41 of the Federal Rules of Criminal Procedure that now simplify the process of getting warrants to hack into devices of US citizens and the citizens of other countries.
The network of the Japanese Defence Ministry was the target of a cyber-attack in September this year. According to an inside source who spoke with Kyodo News, the attack may have been the work of a state-sponsored group.
Roskomnadzor has had secret meetings with Opera representatives, during which Russia's communications regulator has asked Opera Software to implement a site blocking feature in Opera's Turbo Mode.
Some clever Russian crook has found a way to register a lookalike Google domain by taking advantage of Unicode characters to create an alternative way of spelling Google.
The US Internal Revenue Service (IRS) has filed a motion asking the US Federal Court of Northern California to force Coinbase to disclose the personal details of all US users that have conducted Bitcoin trades between January 1, 2013, and December 31, 2015.
The UK government passed yesterday a new sweeping cyber-surveillance that grants authorities the legal power to collect web traffic and telephony data on all UK citizens in bulk, even on people that have never committed a crime or aren't the subjects of an official investigation.
The number of people who dropped F-bombs on Twitter increased more than 3.5 times compared to the average of daily mentions, following news that Donald Trump had won the US presidency. Similarly, the number of people that reacted using "WTF" also more than doubled the same day.
Six hours after Donald Trump had won the 2016 US Presidential Election, a cyber-espionage group believed to operate out of Russia had launched a wave of spear-phishing emails aimed at various US think tanks and non-governmental organizations (NGOs).
Canada's immigration website has gone down on the night of the US Presidential Election after early poll results started coming in, showing Republican candidate Donald Trump holding a small lead, which slowly grew as the evening progressed.
On Monday, November 7, 2016, the Chinese government passed a new cybersecurity law that heavily restricts Internet freedom for the country's citizens and gives the government the power to shut down Internet access at will, in the name of "national security."
Research published last week by the Cyber-Security Research Center at the Ben-Gurion University of the Negev in Israel reveals that it only takes about 6,000 smartphones infected with malware to launch a DDoS attack capable of shutting down 911 emergency services in a US state.
Germany and France feel the makers of encrypted messaging apps like Telegram and Signal should help fight Islamic State terrorists, and they're pushing for Europe-wide rules to make that happen.
Security researchers have uncovered a "strong connection" between a mysterious data dump and a group of hackers known as the Equation Group who are believed to be working for the United States National Security Agency. This connection indicates that the data dump does indeed containing information that belonged to the Equation Group.
Sometimes you read something and you can't quite believe it and then you read it again and get scared. This is what happened when I read through the United States Government Accountability Office's Report to Congressional Requesters about the need to update aging legacy systems.