News
2016
Europe Sets Up Digital 'SWAT' Team for Aviation Cyber Threats- The Wall Street Journal, 1/8/2016
2015
Highway to hack: Why we're just at the beginning of the auto-hacking era- ARS Technica, 8/23/2015
Flash Player plagued by third zero-day flaw in a month, but updates are coming - PCWorld, 2/02/2015
Top 5 cybersecurity risks for 2015 - CNBC, 1/05/2015
2014
Online Security Experts Link More Breaches to Russian Government - NYTimes, 10/28/2014
Pro Hackers Petition White House For DMCA And Computer Crime Law Reform - Forbes, 10/09/2014
A Police Dog for the Digital Age: She Can Smell the USB Drive You're Hiding - Bloomberg, 9/23/2014
Crime Ring Revelation Reveals Cybersecurity Conflict of Interest - Scientific America, 9/15/2014
US court orders son of Russian MP to be held on computer hacking charges - The Guardian, 8/15/2014
How computer hackers changed the Ferguson protests - St. Louis Post-Dispatch, 8/13/2014
Five Smart Cybersecurity Moves From Top Security CEOs - Forbes, 8/4/2014
How cyberthieves are targeting online daters - CNBC, 2/22/2014
China blames Internet outage on hacking attack - Computer World Reuters, 1/22/2014
Makers get tools to hack wearable tech for innovation - PC World, 1/09/2014
Md. man admits taking over YouTube channels for ad money, hacking into AOL CEO's e-mail - The Washington Post, 1/09/2014
2013
Cybersecurity For Africa: As Internet Penetration Grows, AU Seeks To Corral Online Crime - International Business Times, 12/30/2013
NSA 'hacking unit' infiltrates computers around the world - report' - The Guardian, 12/29/2013
Cybersecurity Bill Introduced in House - Gov Info Security, 12/12/2013
NSA uses Google cookies to pinpoint targets for hacking - The Washington Post, 12/10/2013
NIST Cybersecurity Framework: Don't Underestimate It - Information Week, 12/09/2013
Three Cyber Security Tips From A Hacker - Forbes, 12/05/2013
Financial Industry Beats Tech in Cybersecurity Defense - The Wall Street Journal, 11/25/2013
Anonymous Hacker Jeremy Hammond Gets 10 Years in Prison - PC Magazine, 11/18/2013
FBI:Hacks of government computers by Anonymous 'a widespread problem' - NBC News, 11/15/2013
Adobe Breach Inadvertently Tied to Other Accounts - The New York Times, 11/12/2013
Blackhole exploit kit author arrested in Russia - PCWorld, 11/08/2013
Euro cops: We should be allowed to hack into computers - PCWorld , 10/31/2013
Cyber Security Awareness - Why Higher Education Institutions Need to Address Digital Threats - Huffington Post, 10/02/2013
Cybersecurity Is Everyone's Business - Forbes, 10/01/2013
New York Times hacked, Syrian Electronic Army suspected - NBC News, 8/28/2013
Cybersecurity Framework: Filling the Gaps Bank Info Security, 8/13/2013
Security flaws in millions of Volkswagen cars stopped from being revealed after UK injunction - The Washington Post, 7/30/2013
Obama to broach cyberspying with China's Xi Jinping - USA Today, 6/4/2013
Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies – The Washington Post, 5/27/2013
Cybersecurity Starts in High School with Tomorrow's Hires – Bloomberg, 5/15/2013
Cyber Compliance: Hiring a Cybersecurity IT Firm for Rookies – The Wall Street Journal, 5/13/2013
Cyber Compliance: Like App Snapchat, Disappearing E-mails Emerge for the Office Set - The Wall Street Journal, 4/30/2013
Cyber Compliance: Defense Strategies Neglect "Know Your Enemy" Rule - The Wall Street Journal, 4/26/2013
Resolved: the Internet Is No Place for Critical Infrastructure – Association for Computing Machinery, 4/2/2013
Anonymous Hits North Korea Via DDoS – InformationWeek, 4/2/2013
Bank DDoS Attacks Resume: Wells Fargo Confirms Disruptions – Information Week, 3/27/2013
A New Cold War, in Cyberspace, Tests U.S. Ties to China - The New York Times, 2/25/2012
Chinese cyberspies have hacked most Washington institutions, experts say – The Washington Post, 2/20/2013
China's Cybergames - The New York Times, 2/19/2013
China's Army Is Seen as Tied to Hacking Against U.S. - The New York Times, 2/18/2013
Obama Order Gives Firms Cyberthreat Information - The New York Times, 2/12/2013
The poster child for cybersecurity done right: How Estonia learnt from being under attack - ZDNet, 2/5/2013
Mass. at center of a war on hackers - The Boston Globe, 1/28/2013
Cybersecurity Hacktivism = Cybersecurity Escalation - Network World, 1/28/13
Pentagon Expanding Cybersecurity Force to Protect Networks Against Attacks - The New York Times, 1/27/2013
UNT gets $1M NSF grant for cyber security program - Dallas Business Journal, 1/11/2013
2012
Cyber Corps program trains spies for the digital age - Los Angeles Times, 11/22/2012
Killing the Computer to Save It - The New York times, 10/29/12
Cybercrime: Mobile Changes Everything — And No One’s Safe - Wired, 10/25/2012
Panetta: Intruders 'successfully gained access' to critical control systems - Nextgov, 10/12/2012
Hakers, Possibly From Middle East, Block U.S. Banks' Websites - ABC World News, 9/27/2012
Understanding cyberspace is key to defending against digital attacks - The Washington Post, 9/26/2012
In cyberattacks, hacking humans is highly effective way to access systems - The Washington Post, 9/26/2012
Apple UDID hack has BlueToad data, publisher says; Anonymous claims GoDaddy crash - The Washington Post, 9/10/2012
Researcher creates proof-of-concept malware that infects BIOS, network cards - Computer World, 7/29/2012
Next-Gen Air Traffic Control Vulnerable To Hackers Spoofing Planes Out Of Thin Air - Forbes, 7/25/2012
Tridium's Niagara Framework: Marvel of connectivity illustrates new cyber risks - The Washington Post, 7/11/2012
Flame FAQ: All you need to know about the virus - The Washington Post, 6/20/2012
U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officals say - The Washington Post, 6/19/2012
The Growing Threat of Cyberwarfare - The Diane Rehm Show, 6/4/2012