US nuclear weapon bunker security secrets spill from online flashcards since 2013

Details of some US nuclear missile bunkers in Europe, which contain live warheads, along with secret codewords used by guards to signal that they’re being threatened by enemies, were exposed for nearly a decade through online flashcards used for education, Read More …

Intel joins DARPA in search of encryption ‘holy grail’

Intel has signed an agreement with Defense Advanced Research Projects Agency (DARPA) to take part in its Data Protection in Virtual Environments (DPRIVE) program, which is aiming to develop an accelerator for fully homomorphic encryption (FHE). “Fully homomorphic encryption remains Read More …

Hackers breach Foreign Office computers in cyber attack on Government countryside outpost

It is understood the attack is not connected to the devastating cyber attack on the Solar Winds Orion software, which US officials pin on Russian hackers. The Foreign Office has not commented on any suspects of its investigation, but tonight Read More …

The future of cyberconflicts

The ever-increasing role of technology in every aspect of our society has turned cybersecurity into a major sovereignty issue for all states. Due to their asymmetrical nature, offensive cyber-capabilities have been embraced by many countries that wouldn’t otherwise have the Read More …

Mattis establishes DOD task force to protect critical tech, information

Secretary of Defense James Mattis has established a task force whose sole purpose is to better secure the Department of Defense’s important technology and information. Mattis issued a memo dated Oct. 24 creating the Protecting Critical Technology Task Force (PCTTF) to report to the Read More …

NSA employee pleads guilty after stolen classified data landed in Russian hands

A former National Security Agency hacker has admitted to illegally taking highly classified information from the agency’s headquarters, which was later stolen by Russian hackers. Nghia Pho, 67, a Maryland resident who worked for the NSA’s Tailored Access Operations, the Read More …