01/18/2018 / By JD Heyes

For several months the latest scandal tied to the Democratic Party has been quietly building. I say “quietly” because as

http://www.cyberwar.news/2018-01-18-house-investigators-find-pakistani-it-workers-gained-unauthorized-access-to-congressional-servers

01/17/2018 / By Jayson Veley

To say that the government is often unorganized and flat out foolish is a huge understatement. Anyone who has ever

http://www.cyberwar.news/2018-01-17-hawaii-emergency-management-idiot-holds-live-video-conference-with-his-login-password

01/16/2018 / By Ethan Huff

If it exists online and it’s “free,” chances are whoever owns it is collecting data points on how you use

http://www.cyberwar.news/2018-01-16-confirmed-twitter-collects-all-your-dick-picks-and-private-photos

01/11/2018 / By Frances Bloomfield

Researchers from Project Zero, a team of security analysts under Google, have uncovered two computer chip security flaws that could

http://www.cyberwar.news/2018-01-11-billions-intel-amd-powered-devices-vulnerable-hackers

01/08/2018 / By Earl Garcia

Cyber attacks on private schools significantly increased over the recent months, according to the chief executive of the Independent Schools’ Bursars

http://www.cyberwar.news/2018-01-08-google-campus-dangers-revealed-schools-that-have-embraced-google-are-experiencing-security-breeches

01/02/2018 / By David Williams

Facebook has been shown to have a propensity to remove, hide, or outright ban content that it doesn’t find acceptable

http://www.cyberwar.news/2018-01-02-facebooks-internal-filter-failed-to-catch-political-ads-that-were-actually-malware-and-scams-report

12/30/2017 / By Ethan Huff

When moviegoers spent more than $132 million at the box office to watch Tom Cruise in the film Minority Report

http://www.cyberwar.news/2017-12-30-real-life-sci-fi-minority-report-style-security-system-in-china-called-dragonfly-eye-uses-ai-to-identify-criminals

12/28/2017 / By Rita Winters

Free apps come with a price. More often than not, free app developers request permission upon download to access a

http://www.cyberwar.news/2017-12-28-is-your-online-data-secure-the-personal-data-of-31-million-users-was-compromised-by-keyboard-app-developers-who-used-an-unsecured-online-database

12/27/2017 / By David Williams

Threats to cybersecurity aren’t just limited to the home or office environment. There are some people who have to handle

http://www.cyberwar.news/2017-12-27-researchers-create-virtually-indestructible-chips-that-are-also-unhackable-study-finds

12/24/2017 / By Zoey Sky

It has been two decades since DeepBlue defeated Garry Kasparov in a match, but chess players were surprised by another development. The

http://www.cyberwar.news/2017-12-24-new-level-of-intelligence-a-new-ai-can-teach-itself-with-a-reinforcement-learning-algorithm-resulting-in-superhuman-abilities

12/22/2017 / By Ralph Flores

Artificial intelligence (AI) is designed to put us out of the picture. Still, we shouldn’t fret since a recently published

http://www.cyberwar.news/2017-12-22-researchers-look-for-ways-for-humans-to-maintain-control-over-artificial-intelligence

12/17/2017 / By Frances Bloomfield

The recent Equifax Cybersecurity Breach was an eye opener like no other. The personal information of 145 million Americans were

http://www.cyberwar.news/2017-12-17-simple-steps-for-preventing-your-online-presence-from-being-hacked

12/15/2017 / By Frances Bloomfield

Voice security systems are becoming increasingly common as authentication and security features. Part of this growing usage are the efforts

http://www.cyberwar.news/2017-12-15-security-alert-voice-impersonators-can-trick-voice-recognition-systems-according-to-research

12/10/2017 / By Ethan Huff

Another major cryptocurrency heist is being reported in this news, this time at an online Bitcoin marketplace known as NiceHash.

http://www.cyberwar.news/2017-12-10-64m-in-bitcoin-was-just-stolen-by-hackers-who-targeted-nicehash

Popular Articles

×
Please Like our Facebook Page
Show us your support by liking our page!