The Darker Side of the Internet of Things
On Friday, Dyn, a company that routes and manages internet traffic, suffered multiple Distributed Denial of Service (DDoS) attacks throughout the day. Major sites such […] More
On Friday, Dyn, a company that routes and manages internet traffic, suffered multiple Distributed Denial of Service (DDoS) attacks throughout the day. Major sites such […] More
Some stunning things have happened in the past year. Cars were remotely hacked and run off the road. Thieves digitally stole cars in volume, at […] More
The Internet-of-Things has for years promised to usher in a new wave of innovation. It has sometimes been called the Internet-of-Everything or Internet 3.0—grand language […] More
When hackers recently breached the computer systems of the Bangladesh Central Bank and tried to steal nearly $1 billion from its account at the Federal […] More
The Sony Pictures Entertainment hack served as a very public wake-up call to the dangers posed by malicious hackers. In the course of the attacks, […] More
Dark Hotel, Crouching Yeti, Machete, Sofacy, Sandworm – what do these words have in common? They are all names given to hacker groups that have […] More
There’s still much to be learned about the unauthorized release of the so-called Panama Papers, the documents exposing the financial interests of prominent world figures […] More
In the nineteenth century, American strategist Alfred Thayer Mahan helped define a new understanding of maritime security and the role of the U.S. Navy in […] More
With advanced robotics, autonomous machines and nimbler space systems on the agenda for the U.S. military, the Department of Defense has turned its attention to […] More
The Justice Department has dropped its legal effort to force Apple to unlock the iPhone used by one of the shooters in the San Bernardino […] More
When you think of cybersecurity, you probably think about firewalls and passwords – but the ever-changing cyber threat has forced the technology to move far […] More
After years of public attention around Bitcoin, its underlying technology—the blockchain—is taking over the discussion with its potential to address fundamental challenges across a number […] More
Quantum cybersecurity covers the application of quantum technology to enhance cybersecurity. It includes quantum random number generation, which strengthens security through the delivery of stronger […] More
Every day we read another report lamenting the limited workforce that possesses the technical skills so badly needed in cybersecurity. This is a significant challenge […] More
In the wake of a series of high-profile mass shootings, President Barack Obama initiated an executive action directing the Department of Defense, the Department of […] More
Gun technology itself hasn’t changed for the last 100 years, but now we are starting to see a new period of innovation through the integration […] More
The trend of making conventional objects “smart” is continuing unabated, and now even firearms are beginning to have computers integrated into them. The Cipher Brief […] More
The current conflict between Apple and the FBI over developing a means to circumvent security features on the iPhone has reignited the tense debate about […] More
Search