MENU ABOUT US MAKE A DONATION
The Epoch Times
Login
MY ACCOUNT
  • SETTINGS
  • LOGOUT
SEARCH
CLOSE
Help Center subscribe newsletter Newsstands Epoch Shop Gift
  • Editor’s Picks
  • SPECIAL SERIES
  • Special Coverage
  • LATEST ARTICLES
  • US
    • US News
    • US Features
    • Politics
    • Trump Presidency
    • Crime and Incidents
    • New York
    • San Francisco
    • Los Angeles
  • Opinion
    • Thinking About China
    • Viewpoints
    • Unbridled Evil: The Corrupt Reign of Jiang Zemin in China
    • The Reader’s Turn
    • American Essay Contest
  • China
    • China-US News
    • Chinese Regime
    • Business & Economy
    • Chinese Culture
    • China Human Rights
    • China Society
    • Organ Harvesting in China
  • World
    • Africa
    • Americas
    • Asia & Pacific
    • Canada
    • Europe
    • UK
    • Australia
    • International
    • Middle East
  • Business
    • Companies
    • Economies
    • Markets
    • Real Estate
  • ARTS & CULTURE
    • Fine Arts & Craftsmanship
    • Performing Arts
    • Literature
    • Traditional Culture
    • Shen Yun Special Coverage
    • Film Reviews
  • Science
    • News
    • Space
    • Environment
  • Tech
    • Tech News
    • Tech Products & Reviews
    • Social Media
  • Sports
  • Video
    • American Thought Leaders
    • China Insider
    • Crossroads
  • Life & Tradition
    • Inspired
    • Family & Home
    • People
    • Food & Dining
    • Travel
  • Entertainment
    • Film & TV
    • Entertainment News
  • Mind & Body
    • News
    • Aging
    • Fitness & Nutrition
    • Treatments and Techniques
    • Chinese Medicine
    • Mindset
SEARCH
  • Premium
  • US
  • Politics
  • China
  • World
  • Opinion
  • Business
  • Science
  • Life
  • Mind & Body
  • Arts
  • Entertainment
  • Videos
  • Games
  • Livestream
  • SageBook
  • More

Cybersecurity

  • CIA Has Tools to Mimic Known Hacker Groups for Cyberattacks
    CIA Has Tools to Mimic Known Hacker Groups for Cyberattacks
    The CIA has been developing a trove of cyberweapons to be able to monitor consumer electronics, seize control of vehicles, and mask cyberattacks so that they appear to be launched ...
    March 7, 2017BY Joshua Philipp
  • Attacks on the Internet Keep Getting Bigger and Nastier
    Attacks on the Internet Keep Getting Bigger and Nastier
    NEW YORK—Could millions of connected cameras, thermostats and kids' toys bring the internet to its knees? It's beginning ...
    October 22, 2016BY The Associated Press
  • Russia’s Pattern of Influencing Foreign Politics
    Russia’s Pattern of Influencing Foreign Politics
    KYIV, Ukraine—If the FBI proves Russia is behind Friday's leak of embarrassing Democratic National Committee emails, the revelation ...
    July 28, 2016BY Nolan Peterson
  • Inside the Global Banking E-Heist
    Inside the Global Banking E-Heist
    UniTeller is a financial services company that specializes in making international money transfers, servicing a network of some ...
    July 8, 2016BY Joshua Philipp
  • Air Force Computer Crash Wipes Out Over 10 Years Worth of Records
    Air Force Computer Crash Wipes Out Over 10 Years Worth of Records
    Air Force officials announced on Friday, June 10, that it has lost thousands of investigation records dating back ...
    June 15, 2016BY Jim Liao
  • Agreement on Cyberattacks Will Not Stop China’s Economic Theft
    Agreement on Cyberattacks Will Not Stop China’s Economic Theft
    This news analysis was originally dispatched as part of Epoch Times China email newsletters. Subscribe to the newsletters ...
    May 11, 2016BY Joshua Philipp
  • Spy Agencies Are Pushed to Reveal Extent of US Surveillance
    Spy Agencies Are Pushed to Reveal Extent of US Surveillance
    Even though the bulk collection of Americans' telephone records has ended, calls and emails are still being swept ...
    May 8, 2016BY The Associated Press
  • Canada Says Huawei Employees May Be Spies, Rejects Immigration Applications
    Canada Says Huawei Employees May Be Spies, Rejects Immigration Applications
    The Canadian consulate in Hong Kong allegedly rejected the immigration requests of two Huawei employees, citing "reasonable grounds" ...
    May 5, 2016BY Joshua Philipp
  • Why Is Brazil Trying to Block WhatsApp?
    Why Is Brazil Trying to Block WhatsApp?
    The debate about online privacy versus the battle against crime was given new life this week with an ...
    May 5, 2016BY Jill Slay
  • Hackers Are Now Locking Computers for Ransom—Why This Is a Growing Threat
    Hackers Are Now Locking Computers for Ransom—Why This Is a Growing Threat
    At this moment, someone's computer and personal data are being held hostage.
    April 19, 2016BY David Inserra and Evan McDermott
  • The Next Cold War Has Already Begun in Cyberspace
    The Next Cold War Has Already Begun in Cyberspace
    The world is fighting a hidden war thanks to a massive shift in the technologies countries can use ...
    April 9, 2016BY Conor Deane-McKenna
  • FBI Should Learn How to Hack Phones Themselves, Cybersecurity Expert Says
    FBI Should Learn How to Hack Phones Themselves, Cybersecurity Expert Says
    Having tech companies develop loopholes for government agencies would put America’s security at risk.
    March 21, 2016BY ResearchGate
  • Why Modern Pirates Have Turned to Cyber Hacking
    Why Modern Pirates Have Turned to Cyber Hacking
    According to a recent Verizon report, pirates are now utilizing sophisticated cyber tactics to assist in their naval ...
    March 19, 2016BY David Inserra and Evan McDermott
  • In Debate Over Encryption, Obama Says ‘Dangers Are Real’
    In Debate Over Encryption, Obama Says ‘Dangers Are Real’
    President Barack Obama is siding with law enforcement in the debate pitting encryption and personal privacy against national ...
    March 12, 2016BY The Associated Press
  • China Looks to Ramp Up Internet Growth, and Its Controls
    China Looks to Ramp Up Internet Growth, and Its Controls
    China's government has highlighted big data, encryption technology and "core technologies" such as semiconductors as the key elements ...
    March 5, 2016BY The Associated Press
  • Apple Walks a Thin Line on User Privacy While Dealing With China
    Apple Walks a Thin Line on User Privacy While Dealing With China
    Apple has found itself in a funny spot by refusing the FBI's request to unlock the iPhone of ...
    March 1, 2016BY Joshua Philipp
  • Passwords, Privacy, and Protection: Can Apple Meet FBI’s Demand Without Creating a ‘Backdoor’?
    Passwords, Privacy, and Protection: Can Apple Meet FBI’s Demand Without Creating a ‘Backdoor’?
    The San Bernardino terrorist suspect Syed Rizwan Farook used an iPhone 5c, which is now in the possession ...
    March 1, 2016BY H.V. Jagadish
  • What’s Behind the Battle Between FBI and Apple
    What’s Behind the Battle Between FBI and Apple
    A recent court order against Apple compels the company to help the FBI gain access to a locked ...
    February 28, 2016BY David Inserra
  • If You’re Using an ASUS Router, Your Data May Have Been Viewable by Anyone
    If You’re Using an ASUS Router, Your Data May Have Been Viewable by Anyone
    If your Internet connection is going through a router from ASUS, your router—and all your information passing through ...
    February 24, 2016BY Joshua Philipp
  • Cyberwar Is Here to Stay
    Cyberwar Is Here to Stay
    The vulnerability of digital networks is, in many ways, an inevitable consequence of how the Internet was built.
    February 24, 2016BY Paul Rosenzweig
  • What Is Ransomware and How to Protect Your Precious Files From It
    What Is Ransomware and How to Protect Your Precious Files From It
    What would it mean if you lost all of your personal documents, such as your family photos, research ...
    February 24, 2016BY Nikolai Hampton and Zubair Baig
  • Chinese Cybercriminals Go Global in Hacker Underground
    Chinese Cybercriminals Go Global in Hacker Underground
    The Deep Web is the unseen part of the Internet, and Chinese hackers are starting to carve their ...
    February 19, 2016BY Joshua Philipp
  • LA Hospital Pays 17K Ransom to Hackers to Regain Control of Its Computers
    LA Hospital Pays 17K Ransom to Hackers to Regain Control of Its Computers
    It was in the best interest of Hollywood Presbyterian Medical Center to pay the ransom of 40 bitcoins, ...
    February 17, 2016BY The Associated Press
  • Why the IRS Was Just Hacked Again and What the Feds Can Do About It
    Why the IRS Was Just Hacked Again and What the Feds Can Do About It
    Last month hackers stole Internal Revenue Service (IRS) data belonging to more than 100,000 taxpayers.
    February 16, 2016BY Nir Kshetri
  • Next Targets for Chinese Hackers Could Be Agriculture and Alternative Energy
    Next Targets for Chinese Hackers Could Be Agriculture and Alternative Energy
    Targets of major Chinese cyberattacks in 2015 could hint at what industries will be hit this year...
    February 9, 2016BY Joshua Philipp
  • Privacy Shield Replaces Safe Harbor, but Only the Name Has Changed
    Privacy Shield Replaces Safe Harbor, but Only the Name Has Changed
    The replacement for the EU-U.S. Safe Harbor agreement that was ruled unlawful by a European court last year ...
    February 8, 2016BY David Haynes
  • US to Rework Arms Control Rule on Exporting Hacker Tools
    US to Rework Arms Control Rule on Exporting Hacker Tools
    The U.S. government is rewriting a proposal under arms control rules from 20 years ago to make it ...
    February 2, 2016BY The Associated Press
1 2 3 … 5 Next
TOP NEWS
  • Google’s Youtube Suspends Trump, Accuses Him of Violating Its Policies
    NEW By Mimi Nguyen Ly
    Google’s Youtube Suspends Trump, Accuses Him of Violating Its Policies
  • Pelosi Names House Impeachment Managers Ahead of Vote
    NEW By Isabel van Brugen
    Pelosi Names House Impeachment Managers Ahead of Vote
  • FBI Received Intelligence About Potential for Violence Before US Capitol Breach
    NEW By Janita Kan
    FBI Received Intelligence About Potential for Violence Before US Capitol Breach
  • Vermont College Revokes Giuliani’s Honorary Degree
    NEW By Ivan Pentchoukov
    Vermont College Revokes Giuliani’s Honorary Degree
  • Video: Parler CEO On Fighting Censorship and Double Standards, and Restoring Free Speech
    4hr By Joshua Philipp, The Epoch Times
    Video: Parler CEO On Fighting Censorship and Double Standards, and Restoring Free Speech
  • Pence Refuses to Invoke the 25th Amendment
    4hr By Mimi Nguyen Ly
    Pence Refuses to Invoke the 25th Amendment
  • Federal Prosecutors Building Seditious, Conspiracy Cases Against Some Capitol Rioters: DOJ
    4hr By Janita Kan
    Federal Prosecutors Building Seditious, Conspiracy Cases Against Some Capitol Rioters: DOJ
  • Trump Celebrates Border Wall, Immigration Achievements in Texas Visit
    6hr By Ivan Pentchoukov
    Trump Celebrates Border Wall, Immigration Achievements in Texas Visit
  • Minnesota Bar Owner Fights System Over Shutdowns
    6hr By Charlotte Cuthbertson
    Minnesota Bar Owner Fights System Over Shutdowns
  • Florida State Rep. Calls on Gov. DeSantis to Divest From Big Tech Over Censorship
    6hr By Masooma Haq
    Florida State Rep. Calls on Gov. DeSantis to Divest From Big Tech Over Censorship
The Epoch Times
Help Center subscribe newsletter Newsstands Epoch Shop Gift
  • Editor’s Picks
  • SPECIAL SERIES
  • Special Coverage
  • LATEST ARTICLES
You deserve to hear the truth.
  • Help Center
  • Subscribe
  • Press Room
  • About Us
  • Contact Us
  • FAQ
  • RSS Feeds
  • Terms of Services
  • Privacy Policy
  • Copyright Policy
  • Digital Newspaper
  • Our Story
36 COUNTRIES, 22 LANGUAGES
  • English
  • Chinese
  • Spanish
  • Hebrew
  • Japanese
  • Korean
  • Indonesian
  • French
  • German
  • Italian
  • Portuguese
  • Swedish
  • Dutch
  • Russian
  • Ukrainian
  • Romanian
  • Czech
  • Slovak
  • Polish
  • Turkish
  • Persian
  • Vietnamese
DOWNLOAD OUR APP
iOS Android
  • US
    • US News
    • US Features
    • Politics
    • Trump Presidency
    • Crime and Incidents
    • New York
    • San Francisco
    • Los Angeles
  • Opinion
    • Thinking About China
    • Viewpoints
    • Unbridled Evil: The Corrupt Reign of Jiang Zemin in China
    • The Reader’s Turn
    • American Essay Contest
  • China
    • China-US News
    • Chinese Regime
    • Business & Economy
    • Chinese Culture
    • China Human Rights
    • China Society
    • Organ Harvesting in China
  • World
    • Africa
    • Americas
    • Asia & Pacific
    • Canada
    • Europe
    • UK
    • Australia
    • International
    • Middle East
  • Business
    • Companies
    • Economies
    • Markets
    • Real Estate
  • ARTS & CULTURE
    • Fine Arts & Craftsmanship
    • Performing Arts
    • Literature
    • Traditional Culture
    • Shen Yun Special Coverage
    • Film Reviews
  • Science
    • News
    • Space
    • Environment
  • Tech
    • Tech News
    • Tech Products & Reviews
    • Social Media
  • Sports
  • Video
    • American Thought Leaders
    • China Insider
    • Crossroads
  • Life & Tradition
    • Inspired
    • Family & Home
    • People
    • Food & Dining
    • Travel
  • Entertainment
    • Film & TV
    • Entertainment News
  • Mind & Body
    • News
    • Aging
    • Fitness & Nutrition
    • Treatments and Techniques
    • Chinese Medicine
    • Mindset
Copyright © 2000 - 2021
Back Top
We use cookies to understand how you use our site and to improve your experience. This includes personalizing content and advertising. By continuing to use our site, you accept our use of cookies, revised Privacy Policy and Terms of Use. More informationI accept×