MENU
ABOUT US
MAKE A DONATION
Login
MY ACCOUNT
SETTINGS
LOGOUT
SEARCH
CLOSE
Help Center
subscribe
newsletter
Newsstands
Epoch Shop
Gift
Editor’s Picks
SPECIAL SERIES
Special Coverage
LATEST ARTICLES
US
US News
US Features
Politics
Trump Presidency
Crime and Incidents
New York
San Francisco
Los Angeles
Opinion
Thinking About China
Viewpoints
Unbridled Evil: The Corrupt Reign of Jiang Zemin in China
The Reader’s Turn
American Essay Contest
China
China-US News
Chinese Regime
Business & Economy
Chinese Culture
China Human Rights
China Society
Organ Harvesting in China
World
Africa
Americas
Asia & Pacific
Canada
Europe
UK
Australia
International
Middle East
Business
Companies
Economies
Markets
Real Estate
ARTS & CULTURE
Fine Arts & Craftsmanship
Performing Arts
Literature
Traditional Culture
Shen Yun Special Coverage
Film Reviews
Science
News
Space
Environment
Tech
Tech News
Tech Products & Reviews
Social Media
Sports
Video
American Thought Leaders
China Insider
Crossroads
Life & Tradition
Inspired
Family & Home
People
Food & Dining
Travel
Entertainment
Film & TV
Entertainment News
Mind & Body
News
Aging
Fitness & Nutrition
Treatments and Techniques
Chinese Medicine
Mindset
Search Text
SEARCH
Premium
US
Politics
China
World
Opinion
Business
Science
Life
Mind & Body
Arts
Entertainment
Videos
Games
Livestream
SageBook
More
Cybersecurity
CIA Has Tools to Mimic Known Hacker Groups for Cyberattacks
The CIA has been developing a trove of cyberweapons to be able to monitor consumer electronics, seize control of vehicles, and mask cyberattacks so that they appear to be launched ...
March 7, 2017
BY
Joshua Philipp
Attacks on the Internet Keep Getting Bigger and Nastier
NEW YORK—Could millions of connected cameras, thermostats and kids' toys bring the internet to its knees? It's beginning ...
October 22, 2016
BY
The Associated Press
Russia’s Pattern of Influencing Foreign Politics
KYIV, Ukraine—If the FBI proves Russia is behind Friday's leak of embarrassing Democratic National Committee emails, the revelation ...
July 28, 2016
BY
Nolan Peterson
Inside the Global Banking E-Heist
UniTeller is a financial services company that specializes in making international money transfers, servicing a network of some ...
July 8, 2016
BY
Joshua Philipp
Air Force Computer Crash Wipes Out Over 10 Years Worth of Records
Air Force officials announced on Friday, June 10, that it has lost thousands of investigation records dating back ...
June 15, 2016
BY
Jim Liao
Agreement on Cyberattacks Will Not Stop China’s Economic Theft
This news analysis was originally dispatched as part of Epoch Times China email newsletters. Subscribe to the newsletters ...
May 11, 2016
BY
Joshua Philipp
Spy Agencies Are Pushed to Reveal Extent of US Surveillance
Even though the bulk collection of Americans' telephone records has ended, calls and emails are still being swept ...
May 8, 2016
BY
The Associated Press
Canada Says Huawei Employees May Be Spies, Rejects Immigration Applications
The Canadian consulate in Hong Kong allegedly rejected the immigration requests of two Huawei employees, citing "reasonable grounds" ...
May 5, 2016
BY
Joshua Philipp
Why Is Brazil Trying to Block WhatsApp?
The debate about online privacy versus the battle against crime was given new life this week with an ...
May 5, 2016
BY
Jill Slay
Hackers Are Now Locking Computers for Ransom—Why This Is a Growing Threat
At this moment, someone's computer and personal data are being held hostage.
April 19, 2016
BY
David Inserra
and
Evan McDermott
The Next Cold War Has Already Begun in Cyberspace
The world is fighting a hidden war thanks to a massive shift in the technologies countries can use ...
April 9, 2016
BY
Conor Deane-McKenna
FBI Should Learn How to Hack Phones Themselves, Cybersecurity Expert Says
Having tech companies develop loopholes for government agencies would put America’s security at risk.
March 21, 2016
BY
ResearchGate
Why Modern Pirates Have Turned to Cyber Hacking
According to a recent Verizon report, pirates are now utilizing sophisticated cyber tactics to assist in their naval ...
March 19, 2016
BY
David Inserra
and
Evan McDermott
In Debate Over Encryption, Obama Says ‘Dangers Are Real’
President Barack Obama is siding with law enforcement in the debate pitting encryption and personal privacy against national ...
March 12, 2016
BY
The Associated Press
China Looks to Ramp Up Internet Growth, and Its Controls
China's government has highlighted big data, encryption technology and "core technologies" such as semiconductors as the key elements ...
March 5, 2016
BY
The Associated Press
Apple Walks a Thin Line on User Privacy While Dealing With China
Apple has found itself in a funny spot by refusing the FBI's request to unlock the iPhone of ...
March 1, 2016
BY
Joshua Philipp
Passwords, Privacy, and Protection: Can Apple Meet FBI’s Demand Without Creating a ‘Backdoor’?
The San Bernardino terrorist suspect Syed Rizwan Farook used an iPhone 5c, which is now in the possession ...
March 1, 2016
BY
H.V. Jagadish
What’s Behind the Battle Between FBI and Apple
A recent court order against Apple compels the company to help the FBI gain access to a locked ...
February 28, 2016
BY
David Inserra
If You’re Using an ASUS Router, Your Data May Have Been Viewable by Anyone
If your Internet connection is going through a router from ASUS, your router—and all your information passing through ...
February 24, 2016
BY
Joshua Philipp
Cyberwar Is Here to Stay
The vulnerability of digital networks is, in many ways, an inevitable consequence of how the Internet was built.
February 24, 2016
BY
Paul Rosenzweig
What Is Ransomware and How to Protect Your Precious Files From It
What would it mean if you lost all of your personal documents, such as your family photos, research ...
February 24, 2016
BY
Nikolai Hampton
and
Zubair Baig
Chinese Cybercriminals Go Global in Hacker Underground
The Deep Web is the unseen part of the Internet, and Chinese hackers are starting to carve their ...
February 19, 2016
BY
Joshua Philipp
LA Hospital Pays 17K Ransom to Hackers to Regain Control of Its Computers
It was in the best interest of Hollywood Presbyterian Medical Center to pay the ransom of 40 bitcoins, ...
February 17, 2016
BY
The Associated Press
Why the IRS Was Just Hacked Again and What the Feds Can Do About It
Last month hackers stole Internal Revenue Service (IRS) data belonging to more than 100,000 taxpayers.
February 16, 2016
BY
Nir Kshetri
Next Targets for Chinese Hackers Could Be Agriculture and Alternative Energy
Targets of major Chinese cyberattacks in 2015 could hint at what industries will be hit this year...
February 9, 2016
BY
Joshua Philipp
Privacy Shield Replaces Safe Harbor, but Only the Name Has Changed
The replacement for the EU-U.S. Safe Harbor agreement that was ruled unlawful by a European court last year ...
February 8, 2016
BY
David Haynes
US to Rework Arms Control Rule on Exporting Hacker Tools
The U.S. government is rewriting a proposal under arms control rules from 20 years ago to make it ...
February 2, 2016
BY
The Associated Press
1
2
3
…
5
Next
TOP NEWS
Google’s Youtube Suspends Trump, Accuses Him of Violating Its Policies
NEW
By
Mimi Nguyen Ly
Pelosi Names House Impeachment Managers Ahead of Vote
NEW
By
Isabel van Brugen
FBI Received Intelligence About Potential for Violence Before US Capitol Breach
NEW
By
Janita Kan
Vermont College Revokes Giuliani’s Honorary Degree
NEW
By
Ivan Pentchoukov
Video: Parler CEO On Fighting Censorship and Double Standards, and Restoring Free Speech
4hr
By
Joshua Philipp
, The Epoch Times
Pence Refuses to Invoke the 25th Amendment
4hr
By
Mimi Nguyen Ly
Federal Prosecutors Building Seditious, Conspiracy Cases Against Some Capitol Rioters: DOJ
4hr
By
Janita Kan
Trump Celebrates Border Wall, Immigration Achievements in Texas Visit
6hr
By
Ivan Pentchoukov
Minnesota Bar Owner Fights System Over Shutdowns
6hr
By
Charlotte Cuthbertson
Florida State Rep. Calls on Gov. DeSantis to Divest From Big Tech Over Censorship
6hr
By
Masooma Haq