MENU ABOUT US MAKE A DONATION
The Epoch Times
Login
MY ACCOUNT
  • SETTINGS
  • LOGOUT
SEARCH
CLOSE
Help Center subscribe newsletter Newsstands Epoch Shop Gift
  • Editor’s Picks
  • SPECIAL SERIES
  • Special Coverage
  • LATEST ARTICLES
  • US
    • US News
    • US Features
    • Politics
    • Trump Presidency
    • Crime and Incidents
    • New York
    • San Francisco
    • Los Angeles
  • Opinion
    • Thinking About China
    • Viewpoints
    • Unbridled Evil: The Corrupt Reign of Jiang Zemin in China
    • The Reader’s Turn
    • American Essay Contest
  • China
    • China-US News
    • Chinese Regime
    • Business & Economy
    • Chinese Culture
    • China Human Rights
    • China Society
    • Organ Harvesting in China
  • World
    • Africa
    • Americas
    • Asia & Pacific
    • Canada
    • Europe
    • UK
    • Australia
    • International
    • Middle East
  • Business
    • Companies
    • Economies
    • Markets
    • Real Estate
  • ARTS & CULTURE
    • Fine Arts & Craftsmanship
    • Performing Arts
    • Literature
    • Traditional Culture
    • Shen Yun Special Coverage
    • Film Reviews
  • Science
    • News
    • Space
    • Environment
  • Tech
    • Tech News
    • Tech Products & Reviews
    • Social Media
  • Sports
  • Video
    • American Thought Leaders
    • China Insider
    • Crossroads
  • Life & Tradition
    • Inspired
    • Family & Home
    • People
    • Food & Dining
    • Travel
  • Entertainment
    • Film & TV
    • Entertainment News
  • Mind & Body
    • News
    • Aging
    • Fitness & Nutrition
    • Treatments and Techniques
    • Chinese Medicine
    • Mindset
SEARCH
  • Premium
  • US
  • Politics
  • China
  • World
  • Opinion
  • Business
  • Science
  • Life
  • Mind & Body
  • Arts
  • Entertainment
  • Videos
  • Games
  • Livestream
  • SageBook
  • More

hackers

  • Erase Personal Data From Second-Hand Devices or Risk Fraud, Warns Security Watchdog
    Erase Personal Data From Second-Hand Devices or Risk Fraud, Warns Security Watchdog
    Britain’s national cybersecurity watchdog has advised anyone buying or selling a second-hand electronic device to erase personal data or risk hacking and fraud. The National Cyber Security Centre (NCSC) said ...
    December 28, 2020BY Mary Clark
  • NTD Evening News Full Broadcast (Oct. 15)
    NTD Evening News Full Broadcast (Oct. 15)
    Democratic nominee Joe Biden's son Hunter allegedly received extensive financial gains from a Chinese company, the Senate Judiciary Committee ...
    October 15, 2020BY NTD Television
  • Thousands of CRA and Government Accounts Disabled After Cyberattack
    Thousands of CRA and Government Accounts Disabled After Cyberattack
    Federal authorities were scrambling for answers over the weekend after revealing that hackers used thousands of stolen usernames ...
    August 16, 2020BY The Canadian Press
  • Twitter Says Hackers Used Phone to Fool Staff, Gain Access
    Twitter Says Hackers Used Phone to Fool Staff, Gain Access
    LONDON—Twitter says the hackers responsible for a recent high-profile breach used the phone to fool the social media ...
    July 31, 2020BY The Associated Press
  • Beware the Social Justice Hackers
    Beware the Social Justice Hackers
    Commentary When I was 13 years old, I learned about computers. We were fortunate to have a Digital ...
    July 20, 2020BY Bob Zeidman
  • Coronavirus: Hackers Try To Take Advantage of People Working From Home
    Coronavirus: Hackers Try To Take Advantage of People Working From Home
    As many people are asked to work from home amid the coronavirus pandemic, hackers and cyber criminals are ...
    March 17, 2020BY Joshua Philipp
  • Hackers Hit Global Telcos in Espionage Campaign With Links to China
    Hackers Hit Global Telcos in Espionage Campaign With Links to China
    TEL AVIV—Hackers have broken into the systems of more than a dozen global telecommunication companies and taken large ...
    June 25, 2019BY Reuters
  • China Hacked Norway’s Visma to Steal Client Secrets
    China Hacked Norway’s Visma to Steal Client Secrets
    LONDON—Hackers working on behalf of Chinese intelligence breached the network of Norwegian software firm Visma to steal secrets ...
    February 6, 2019BY Reuters
  • US, Allies Slam China for Economic Espionage
    US, Allies Slam China for Economic Espionage
    WASHINGTON/LONDON—The United States and three allies chastised China for economic espionage on Dec. 20, ratcheting up tensions as ...
    December 21, 2018BY Reuters
  • China Hacked HPE, IBM and then Attacked Clients
    China Hacked HPE, IBM and then Attacked Clients
    WASHINGTON/LONDON/SAN FRANCISCO—Hackers working on behalf of China's Ministry of State Security breached the networks of Hewlett Packard Enterprise ...
    December 20, 2018BY Reuters
  • US to Reveal Charges Against Chinese Hackers
    US to Reveal Charges Against Chinese Hackers
    Federal prosecutors are expected to unveil criminal charges as soon as next week against hackers linked to Chinese ...
    December 7, 2018BY Reuters
  • Halting Hackers on the Holidays
    Halting Hackers on the Holidays
    As we wind down National Cyber Security Awareness Month in October, we count the breaches and total personally identifiable ...
    October 19, 2018BY Gary Miliefsky
  • Chip-Level Spying Has a Long History Under the Chinese Regime
    Chip-Level Spying Has a Long History Under the Chinese Regime
    News Analysis If Chinese spy chips were found in the hardware of Apple and Amazon (they were according ...
    October 5, 2018BY Joshua Philipp
  • Understanding Chinese Spy Operations Is Central to Understanding Cyberattacks
    Understanding Chinese Spy Operations Is Central to Understanding Cyberattacks
    In 2014, five Chinese military hackers were indicted for offenses that included computer hacking and economic espionage, targeting Americans in ...
    October 1, 2018BY Bowen Xiao and Joshua Philipp
  • US Senate Staff Targeted by Hackers
    US Senate Staff Targeted by Hackers
    Attempts by foreign government hackers to break into the personal email accounts of U.S. senators and their aides ...
    September 20, 2018BY The Associated Press
  • Security Flaws Put Virtually All Phones, Computers at Risk
    Security Flaws Put Virtually All Phones, Computers at Risk
    FRANKFURT/SAN FRANCISCO–Security researchers on Wednesday disclosed a set of security flaws that they said could let hackers steal ...
    January 4, 2018BY Reuters
  • Hacker Hijacks North Korean Radio Station, Plays ‘The Final Countdown’
    Hacker Hijacks North Korean Radio Station, Plays ‘The Final Countdown’
    An unknown hacker has allegedly hijacked North Korean short-wave radio station, 6400kHz, and is broadcasting the 1986 hit ...
    November 10, 2017BY Joshua Philipp
  • Researchers Say Global Cyber Attack Similar to North Korean Hacks
    Researchers Say Global Cyber Attack Similar to North Korean Hacks
    SEOUL/WASHINGTON—Cybersecurity researchers have found evidence they say could link North Korea with the WannaCry cyber attack that has ...
    May 16, 2017BY Reuters
  • How a Video Game Villain Led Researchers to the Man Behind ‘The Shadow Brokers’
    How a Video Game Villain Led Researchers to the Man Behind ‘The Shadow Brokers’
    A new group of hackers emerged in August, motivated by money and going after big game. They called ...
    December 15, 2016BY Joshua Philipp
  • Malware That Took Part of the Internet Offline Presents Ongoing Threat
    Malware That Took Part of the Internet Offline Presents Ongoing Threat
    Major websites including Netflix, Amazon, Twitter, Reddit, and others sputtered out on Oct. 21, as a cyberattack with ...
    November 1, 2016BY Joshua Philipp
  • Hacker Leaks Hundreds of IP Addresses, Phonebooks of ISIS Recruiters
    Hacker Leaks Hundreds of IP Addresses, Phonebooks of ISIS Recruiters
    A hacker who has gained renown for hacking and humiliating ISIS recruiters has struck the terrorist organization again, ...
    August 30, 2016BY Joshua Philipp
  • US Cyber Sanctions: Effective Deterrent or Throwing Money at a Problem?
    US Cyber Sanctions: Effective Deterrent or Throwing Money at a Problem?
    News Analysis In April 2015, President Barack Obama enacted an Executive Order (EO) "Blocking the Property of Certain ...
    June 28, 2016BY Emilio Iasiello
  • EXCLUSIVE: Hackers Compromise Global Banking System at Highest Level, Investigator Reveals
    EXCLUSIVE: Hackers Compromise Global Banking System at Highest Level, Investigator Reveals
    The global banking system has been compromised by cybercriminals who have demonstrated they have high-level access that gives ...
    June 16, 2016BY Joshua Philipp
  • Actor Tom Hardy Says He Regularly Changes Phones to Protect Himself and Family From Hackers
    Actor Tom Hardy Says He Regularly Changes Phones to Protect Himself and Family From Hackers
    Actor Tom Hardy says he continuously changes his phone to protect his privacy and says that the ongoing ...
    June 2, 2016BY Denisse Moreno
  • Intelligence: Hackers Are Spying on Presidential Candidates, Expect More Cyber Threats
    Intelligence: Hackers Are Spying on Presidential Candidates, Expect More Cyber Threats
    The Director of National Intelligence, James Clapper, says foreign hackers are spying on presidential candidates, and expects more ...
    May 18, 2016BY Denisse Moreno
  • Agreement on Cyberattacks Will Not Stop China’s Economic Theft
    Agreement on Cyberattacks Will Not Stop China’s Economic Theft
    This news analysis was originally dispatched as part of Epoch Times China email newsletters. Subscribe to the newsletters ...
    May 11, 2016BY Joshua Philipp
  • Hackers Have Launched a War Against the KKK and the Spread of Online Hate
    Hackers Have Launched a War Against the KKK and the Spread of Online Hate
    Hackers are launching a campaign against the promotion of hatred and racism online, and one of their main ...
    April 21, 2016BY Joshua Philipp
1 2 3 … 6 Next
TOP NEWS
  • Texas Set to Bring Volley of Lawsuits Against Biden Administration
    NEW By Tom Ozimek
    Texas Set to Bring Volley of Lawsuits Against Biden Administration
  • Honolulu Prosecutors Seek to Drop Charges Against Surgeon General for Allegedly Flouting Virus Restrictions
    NEW By Tom Ozimek
    Honolulu Prosecutors Seek to Drop Charges Against Surgeon General for Allegedly Flouting Virus Restrictions
  • Trump Leaves Washington, Tells Supporters: ‘We Will Be Back in Some Form’
    NEW By Zachary Stieber
    Trump Leaves Washington, Tells Supporters: ‘We Will Be Back in Some Form’
  • CCP Virus Updates: China, WHO Should Have Acted Quicker, Panel Says
    2hr By Epoch Times Staff
    CCP Virus Updates: China, WHO Should Have Acted Quicker, Panel Says
  • Two More Chinese Cities Go Under Lockdown, as Beijing Mandates Four-Week Quarantine for Travelers
    2hr By Nicole Hao
    Two More Chinese Cities Go Under Lockdown, as Beijing Mandates Four-Week Quarantine for Travelers
  • Biden’s Defense Secretary Pick Vows to ‘Rid Our Ranks of Racists and Extremists’
    2hr By Tom Ozimek
    Biden’s Defense Secretary Pick Vows to ‘Rid Our Ranks of Racists and Extremists’
  • Industry Leader Calls on Aussie Diplomats to ‘Step Up’ Amid CCP Economic Coercion
    2hr By Victoria Kelly-Clark
    Industry Leader Calls on Aussie Diplomats to ‘Step Up’ Amid CCP Economic Coercion
  • Graham Calls on McConnell to ‘Unequivocally’ Denounce Fresh Trump Impeachment
    3hr By Zachary Stieber
    Graham Calls on McConnell to ‘Unequivocally’ Denounce Fresh Trump Impeachment
  • McConnell Pushes to Preserve Filibuster in Divided Senate’s Power-Sharing Agreement
    3hr By Zachary Stieber
    McConnell Pushes to Preserve Filibuster in Divided Senate’s Power-Sharing Agreement
  • Biden to Rely on Executive Orders, Appointees to Push Progressive Agenda
    4hr By Mark Tapscott
    Biden to Rely on Executive Orders, Appointees to Push Progressive Agenda
The Epoch Times
Help Center subscribe newsletter Newsstands Epoch Shop Gift
  • Editor’s Picks
  • SPECIAL SERIES
  • Special Coverage
  • LATEST ARTICLES
You deserve to hear the truth.
  • Help Center
  • Subscribe
  • Press Room
  • About Us
  • Contact Us
  • FAQ
  • RSS Feeds
  • Terms of Services
  • Privacy Policy
  • Copyright Policy
  • Digital Newspaper
  • Our Story
36 COUNTRIES, 22 LANGUAGES
  • English
  • Chinese
  • Spanish
  • Hebrew
  • Japanese
  • Korean
  • Indonesian
  • French
  • German
  • Italian
  • Portuguese
  • Swedish
  • Dutch
  • Russian
  • Ukrainian
  • Romanian
  • Czech
  • Slovak
  • Polish
  • Turkish
  • Persian
  • Vietnamese
DOWNLOAD OUR APP
iOS Android
  • US
    • US News
    • US Features
    • Politics
    • Trump Presidency
    • Crime and Incidents
    • New York
    • San Francisco
    • Los Angeles
  • Opinion
    • Thinking About China
    • Viewpoints
    • Unbridled Evil: The Corrupt Reign of Jiang Zemin in China
    • The Reader’s Turn
    • American Essay Contest
  • China
    • China-US News
    • Chinese Regime
    • Business & Economy
    • Chinese Culture
    • China Human Rights
    • China Society
    • Organ Harvesting in China
  • World
    • Africa
    • Americas
    • Asia & Pacific
    • Canada
    • Europe
    • UK
    • Australia
    • International
    • Middle East
  • Business
    • Companies
    • Economies
    • Markets
    • Real Estate
  • ARTS & CULTURE
    • Fine Arts & Craftsmanship
    • Performing Arts
    • Literature
    • Traditional Culture
    • Shen Yun Special Coverage
    • Film Reviews
  • Science
    • News
    • Space
    • Environment
  • Tech
    • Tech News
    • Tech Products & Reviews
    • Social Media
  • Sports
  • Video
    • American Thought Leaders
    • China Insider
    • Crossroads
  • Life & Tradition
    • Inspired
    • Family & Home
    • People
    • Food & Dining
    • Travel
  • Entertainment
    • Film & TV
    • Entertainment News
  • Mind & Body
    • News
    • Aging
    • Fitness & Nutrition
    • Treatments and Techniques
    • Chinese Medicine
    • Mindset
Copyright © 2000 - 2021
Back Top
We use cookies to understand how you use our site and to improve your experience. This includes personalizing content and advertising. By continuing to use our site, you accept our use of cookies, revised Privacy Policy and Terms of Use. More informationI accept×