Pages

Categories

Search

 

Cybersecurity

Smart grid technology, which aims to make the nation’s power grid more efficient and interactive, may not be the bright idea its backers suggest unless it can be made more secure. Without some thought given to security as Advanced Metering Infrastructure (AMI) Smart Meter devices are developed...

The Whitianga teenager who brought a US university to its knees with his hacking antics has been hired by a telecommunications company. Owen Thor Walker, 19, offending under the name Akill became the subject of a United States Federal Bureau of Investigation cyber crime investigation spanning the US...

Senate Commerce Chairman John (Jay) Rockefeller and Sen. Olympia Snowe, R-Maine, are crafting legislation that they hope will improve the country’s cybersecurity posture in the face of increasingly sophisticated global attacks against U.S. government networks as well as the nation’s broa...

An extraordinary behind-the-scenes struggle is taking place between computer security groups around the world and the brazen author of a malicious software program called Conficker. The program grabbed global attention when it began spreading late last year and quickly infected millions of computers...

Computer security researchers have devised a new Twitter attack that they say could spread virally, much like a worm on the microblogging service. The attack, posted online Thursday by researchers at Secure Science, is an innocuous proof of concept that forces users to send out a predetermined Twitt...