facebookcollapse
searchengine
robotics
virtualreality
computing
cyberwar
glitch
News & Articles By JD Heyes
06/03/2017
/
By JD Heyes
Will ISIS launch the next “WannaCry” ransomware cyber attack to cripple America?
Until the recent “WannaCry” ransomware cyber attack, which experts believe was launched by North Korea and which infected some 300,000 computers in 150 countries, most people outside of the IT sector had no idea such a threat even existed. The idea that some hacker could literally take over a computer, hold its contents and files […]
06/01/2017
/
By JD Heyes
Surviving cyber war: What you can do to help “cyber proof” your life
In the age of the computer, we are constantly reminded of just how vulnerable our lives have become to cyber attack. In recent years cyber attacks have increased dramatically, having been launched scores of times against critical and non-critical infrastructure around the world. In addition, so-called “ransomware” attacks, like the recent one involving “WannaCry” malware […]
05/15/2017
/
By JD Heyes
Massive global ransomware attack underscores vulnerability of critical infrastructure needed to sustain life
A day before a global ransomware attack crippled the National Health Service in Britain and struck Russian government offices as well as institutions in dozens of other countries, President Donald J. Trump signed an executive order instructing federal department heads to focus on strengthening cybersecurity, with an eye toward protecting critical national infrastructure like the […]
05/15/2017
/
By JD Heyes
This is what happens when government cyber weapons get loose
The massive global ransomware attack that occured on Friday and which permeated governments, corporations and Britain’s entire National Health Service, was conducted with malware developed by – and stolen from – the U.S. National Security Agency. Known as “WannaCry,” the theft of the malware and its posting online has left many asking what additional malware […]
03/10/2017
/
By JD Heyes
Apple iOS and Microsoft Windows have “gaping holes” that were exploited by the CIA to install spyware on anyone’s computer, anywhere in the world
Thousands of documents taken from the CIA and leaked to Wikileaks this week reveal that the nation’s top spy agency has a plethora of electronic capabilities that allow it hack into and monitor virtually every device and operating system in use today. As revealed in a statement to the public and the press on Wednesday, […]
« Previous Page
17 of 17
Get Our Free Email Newsletter
Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more.
Your privacy is protected.
Subscription confirmation required.
Popular Articles
Get Our Free Email Newsletter
Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more.
Subscription confirmation required.
We respect your privacy
and do not share emails with anyone. You can easily unsubscribe at any time.
COPYRIGHT © 2017 COMPUTING NEWS
Privacy Policy
Get Our Free Email Newsletter
Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more.
Subscription confirmation required.
We respect your privacy
and do not share emails with anyone. You can easily unsubscribe at any time.
Close
x
By continuing to browse our site you agree to our use of cookies and our
Privacy Policy
.
Agree and close