ABOUT US
Login
MY ACCOUNT
  • SETTINGS
  • LOGOUT
CLOSE
subscribe newsletter Newsstands
  • Editor’s Picks
  • SPECIAL SERIES
  • Special Coverage
  • LATEST ARTICLES
  • US
    • US News
    • US Features
    • Politics
    • Trump Presidency
    • Crime and Incidents
    • New York
    • San Francisco
    • Los Angeles
  • Opinion
    • Thinking About China
    • Viewpoints
    • Declassified
    • American Thought Leaders
  • China
    • China-US News
    • Chinese Regime
    • Business & Economy
    • Chinese Culture
    • China Human Rights
    • China Society
    • Organ Harvesting in China
  • World
    • Africa
    • Americas
    • Asia & Pacific
    • Canada
    • Europe
    • UK
    • Australia
    • International
    • Middle East
  • Business
    • Companies
    • Economies
    • Markets
    • Real Estate
  • ARTS & CULTURE
    • Fine Arts
    • Performing Arts
    • Literature
    • Traditional Culture
    • Shen Yun Special Coverage
  • Science
    • News
    • Space
    • Environment
  • Tech
    • Tech News
    • Tech Products & Reviews
    • Social Media
  • Sports
  • Food
  • Video
    • American Thought Leaders
    • Declassified
    • Crossroads
    • What Defines You
  • Life & Tradition
    • Slice of Life
    • Family & Home
    • Relationships
    • Education
    • Inspired
    • Travel
  • Entertainment
    • Film Reviews
    • Film & TV
    • Entertainment News
  • Wellness
    • News
    • Fitness & Nutrition
    • Treatments and Techniques
    • Traditional Chinese Medicine
    • Mindset
    • Lifestyle
  • US
  • Politics
  • China
  • World
  • Opinion
  • Business
  • Tech
  • Science
  • Wellness
  • Food
  • Arts
  • Entertainment
  • Videos
  • Subscribe
  • More

hacker

  • Chinese State-Sponsored Hackers Intercept Text Messages Worldwide: Cyber Report
    Chinese State-Sponsored Hackers Intercept Text Messages Worldwide: Cyber Report
    U.S.-based cybersecurity firm FireEye revealed that the Chinese hacker group APT41 has been backed by the state in compromising several major telecom firms and retrieving call records from the carriers’ ...
    November 3, 2019BY Nicole Hao
  • Capital One Hacker Steals Personal Data of 6 Million Canadians
    Capital One Hacker Steals Personal Data of 6 Million Canadians
    Capital One Financial Corp., the North American bank holding giant, announced on Monday that a hacker had managed ...
    July 30, 2019BY Lily Liu
  • 5 Suspects Hacked ATMs and Stole Thousands, Police Ask for Public’s Help
    5 Suspects Hacked ATMs and Stole Thousands, Police Ask for Public’s Help
    The Los Angeles County Sheriff's Department (LASD) is seeking the public's help to identify a group of suspects ...
    January 31, 2019BY Zach Li
  • US Charges Suspected Hacker, Traders Over SEC Database Hack
    US Charges Suspected Hacker, Traders Over SEC Database Hack
    U.S. authorities on Jan. 15 charged a suspected Ukrainian computer hacker and several traders with involvement in a ...
    January 16, 2019BY Reuters
  • American Space Development Targeted by China, Hackers
    American Space Development Targeted by China, Hackers
    Two Chinese hackers have been indicted by the Department of Justice with conspiracy to commit computer intrusions, as ...
    December 29, 2018BY Daniel Holl
  • Facebook Tentatively Concludes Spammers Were Behind Recent Data Breach: WSJ
    Facebook Tentatively Concludes Spammers Were Behind Recent Data Breach: WSJ
    Facebook has tentatively concluded that spammers looking to make money, and not a nation-state, were behind the largest-ever ...
    October 18, 2018BY Reuters
  • Tesla Car Hacked by Chinese Tech Company
    Tesla Car Hacked by Chinese Tech Company
    Modern cars are more sophisticated than ever. But the smarter they become, the more vulnerable they are to ...
    September 23, 2016BY Emel Akan
  • MySpace Hacked—It’s a Bigger Deal Than You May Think
    MySpace Hacked—It’s a Bigger Deal Than You May Think
    Remember MySpace?—you know, the site where people used to go for social media before Facebook. Since it was ...
    May 31, 2016BY Petr Svab
  • ‘Guccifer’ Claims Hacking Into Clinton’s Server Was ‘Easy’
    ‘Guccifer’ Claims Hacking Into Clinton’s Server Was ‘Easy’
    Romanian hacker Marcel Lehel Lazar, who goes by the handle "Guccifer," said in an NBC interview that he ...
    May 5, 2016BY Steven Klett
  • Automakers Trying to Prevent Hackers From Commandeering Cars
    Automakers Trying to Prevent Hackers From Commandeering Cars
    DETROIT— When researchers at two West Coast universities took control of a General Motors car through cellular and ...
    August 5, 2015BY The Associated Press
  • Obama Resurrects Decade-Old Ideas for ‘New’ Cybersecurity Proposal
    Obama Resurrects Decade-Old Ideas for ‘New’ Cybersecurity Proposal
    Pres. Obama is proposing cybersecurity laws that increases government information-sharing and protects businesses from lawsuits for revealing cyberthreats.
    January 13, 2015BY Jack Gillum
  • FBI Director Comey Certain North Korea Was Behind Sony Cyberattack
    FBI Director Comey Certain North Korea Was Behind Sony Cyberattack
    FBI Director James Comey says he's confident that North Korea was behind the cyberattack on Sony.
    January 7, 2015BY Tom Hays
  • Sony and the New Normal in Cybersecurity
    Sony and the New Normal in Cybersecurity
    For Sony Pictures, the gift of litigation came early this year. On the week before Christmas, the entertainment ...
    January 1, 2015BY Jonathan Zhou
  • North Korea Internet Outage a Case Study in Online Uncertainties
    North Korea Internet Outage a Case Study in Online Uncertainties
    North Korea's microscopic corner of the Internet has had a rough couple of days, suffering seven outages in ...
    December 24, 2014BY Raphael Satter
  • Can a Hacker Stop Your Car or Your Heart? Security and the Internet of Things
    Can a Hacker Stop Your Car or Your Heart? Security and the Internet of Things
    An ever-increasing number of our consumer electronics is internet-connected. We’re living at the dawn of the age of ...
    November 19, 2014BY Temitope Oluwafemi
  • Why the CCP Keeps Hacking Epoch Times
    Why the CCP Keeps Hacking Epoch Times
    The Epoch Times website was hacked again on July 30. There must have been big news happening in ...
    August 6, 2014BY Guo Hui
  • Canada Finally Names China in Cyber Crimes
    Canada Finally Names China in Cyber Crimes
    Canada is finally breaking its silence on China’s cyber espionage, something the US and other government have done, ...
    July 31, 2014BY Matthew Little
  • What the US Prosecution of Chinese Military Hackers Says About US–China Relations
    What the US Prosecution of Chinese Military Hackers Says About US–China Relations
    In a forceful series of statements on Monday, the United States Department of Justice brought charges against five ...
    May 19, 2014BY Matthew Robertson
  • Exonerated Hacker Starts Hedge Fund
    Exonerated Hacker Starts Hedge Fund
    Computer hacker Andrew Auernheimer's new hedge fund could yield unprecedented returns with a short only strategy.
    April 28, 2014BY ramon.qiu
  • Black Markets for Hackers Are Increasingly Sophisticated, Specialized and Maturing
    Black Markets for Hackers Are Increasingly Sophisticated, Specialized and Maturing
    Black and gray markets for computer hacking tools, services and byproducts such as stolen credit card numbers continue ...
    March 29, 2014BY RAND Corporation
  • Target Corp. Breached at Weakest Link
    Target Corp. Breached at Weakest Link
    Target could be fined from $400 million to $1.1 billion after hackers stole credit card numbers from up ...
    February 11, 2014BY Joshua Philipp
  • After Major Cyberattack, Election Commission Still Vulnerable
    After Major Cyberattack, Election Commission Still Vulnerable
    A new audit shows that the Federal Election Commission is still vulnerable to cyberattack.
    January 2, 2014BY Joshua Philipp
  • China Hacks India’s Defense Ministry
    China Hacks India’s Defense Ministry
    India’s top security body has been breached in a cyber-attack believed to be sponsored by the Chinese Communist ...
    March 13, 2013BY Cassie Ryan
  • ‘The Universal Machine’ Author Describes the People Behind Computing
    ‘The Universal Machine’ Author Describes the People Behind Computing
    The term “hacker” has received a bad rap because of cybercriminals.
    June 26, 2012BY Joshua Philipp
  • The Good Hacker
    The Good Hacker
    Shaharabani is a senior expert for data security at IBM says when a username and password are typed ...
    March 14, 2012BY Ben Kaminsky and Eyal Levinter
TOP NEWS
  • Seniors Lend Support Behind the Scenes in Hong Kong Protests
    NEW By Annie Wu, Epoch Times
    Seniors Lend Support Behind the Scenes in Hong Kong Protests
  • Supreme Court Agrees to Hear Appeals Over the Release of Trump’s Financial Records
    NEW By Janita Kan
    Supreme Court Agrees to Hear Appeals Over the Release of Trump’s Financial Records
  • Beijing to Buy $200 Billion in US Goods as Part of Initial US-China Trade Deal
    2hr By Cathy He and Emel Akan
    Beijing to Buy $200 Billion in US Goods as Part of Initial US-China Trade Deal
  • US Defense Bill Set to Stem the Flow of Chinese Fentanyl into America
    2hr By Frank Fang, Epoch Times
    US Defense Bill Set to Stem the Flow of Chinese Fentanyl into America
  • Education Secretary Defends Debt Relief Plan, Blames Obama Administration for Leaving Problem Behind
    2hr By GQ Pan
    Education Secretary Defends Debt Relief Plan, Blames Obama Administration for Leaving Problem Behind
  • Trump Says He ‘Wouldn’t Mind’ a Long Impeachment Trial
    3hr By Zachary Stieber
    Trump Says He ‘Wouldn’t Mind’ a Long Impeachment Trial
  • Judge Rejects DOJ Effort to Delay House Lawsuit Against Trump Administration
    4hr By Jack Phillips
    Judge Rejects DOJ Effort to Delay House Lawsuit Against Trump Administration
subscribe newsletter Newsstands Epoch Shop
  • Editor’s Picks
  • SPECIAL SERIES
  • Special Coverage
  • LATEST ARTICLES
  • Subscribe
  • Advertise
  • About Us
  • Contact Us
  • FAQ
  • RSS Feeds
  • Terms of Services
  • Privacy Policy
  • Copyright Policy
  • Digital Newspaper
35 COUNTRIES, 21 LANGUAGES
  • English
  • Chinese
  • Spanish
  • Hebrew
  • Japanese
  • Korean
  • Indonesian
  • French
  • German
  • Italian
  • Portuguese
  • Swedish
  • Dutch
  • Russian
  • Ukrainian
  • Romanian
  • Czech
  • Slovak
  • Polish
  • Turkish
  • Persian
  • US
    • US News
    • US Features
    • Politics
    • Trump Presidency
    • Crime and Incidents
    • New York
    • San Francisco
    • Los Angeles
  • Opinion
    • Thinking About China
    • Viewpoints
    • Declassified
    • American Thought Leaders
  • China
    • China-US News
    • Chinese Regime
    • Business & Economy
    • Chinese Culture
    • China Human Rights
    • China Society
    • Organ Harvesting in China
  • World
    • Africa
    • Americas
    • Asia & Pacific
    • Canada
    • Europe
    • UK
    • Australia
    • International
    • Middle East
  • Business
    • Companies
    • Economies
    • Markets
    • Real Estate
  • ARTS & CULTURE
    • Fine Arts
    • Performing Arts
    • Literature
    • Traditional Culture
    • Shen Yun Special Coverage
  • Science
    • News
    • Space
    • Environment
  • Tech
    • Tech News
    • Tech Products & Reviews
    • Social Media
  • Sports
  • Food
  • Video
    • American Thought Leaders
    • Declassified
    • Crossroads
    • What Defines You
  • Life & Tradition
    • Slice of Life
    • Family & Home
    • Relationships
    • Education
    • Inspired
    • Travel
  • Entertainment
    • Film Reviews
    • Film & TV
    • Entertainment News
  • Wellness
    • News
    • Fitness & Nutrition
    • Treatments and Techniques
    • Traditional Chinese Medicine
    • Mindset
    • Lifestyle
Copyright © 2000 - 2019
We use cookies to understand how you use our site and to improve your experience. This includes personalizing content and advertising. By continuing to use our site, you accept our use of cookies, revised Privacy Policy and Terms of Use. More informationI accept×