China's most powerful internet regulator has formally set controls over the country's thriving online broadcasting sector, requiring people live-streaming news and entertainment content to have a licence, among other rules," Zhuang Pinghui reporting today in South China Moring Post.
Access to multiple social media services including Facebook, Twitter and YouTube have been reported throughout Turkey beginning Friday Nov 04 2016 1:20AM local time – ongoing as of Friday noon.
Appointments and operations at three hospitals in the United Kingdom have been canceled due to a cyberattack on the computer network lasting five days.
A team of researchers have released a report detailing a new type of threat in which adjacent IoT devices, such as Internet-connected light bulbs, will infect each other with a worm that will spread explosively over large areas in a kind of nuclear chain reaction.
The entire internet infrastructure of the African nation of Liberia is distributed by the same weapon used to cause the historic cyberattack just two weeks ago.
Governments are toying with the idea of asking ICANN for greater powers over gTLDs that match their geographic features," Kevin Murphy reporting in Domain Incite.
"In the first newspaper interview given by an incumbent MI5 chief in the service's 107-year history, Andrew Parker said that at a time when much of the focus was on Islamic extremism, covert action from other countries was a growing danger. Most prominent was Russia," Ewen MacAskill and Paul Johnson reporting in The Guardian.
The National Cybersecurity Center of Excellence (NCCoE) has invited comments on a draft practice guide to help organizations improve email security and defend against phishing, man-in-the-middle, and other types of email-based attacks.
Britain's finance minister on Tuesday announced government's new five year National Cyber Security Strategy, almost doubling the funding from its 2011 plan to 1.9 billion-pound ($2.3 billion).
The U.S. government has released an updated version of the Digital Millennium Copyright Act (DMCA), adding a list of new exemptions that will protect cybersecurity professionals from prosecution over reverse-engineering of products for research purposes.
A team of researchers from Princeton University and the University of California has developed a machine-learning algorithm named PREDATOR that can accurately establish domain reputation at the time of domain registration.
The controversial Chinese cybersecurity law that has been sparking objections amongst foreign governments and business groups reached a step closer to approval today as parliament held the third reading of the draft bill.
In the upcoming Black Hat London presentation, security researcher from University College London, Vasilios Mavroudis and colleagues are going to describe and demonstrate the practical security and privacy risks that arise with the adoption systems enabled with ultrasonic cross-device tracking (uXDT).
Cyber Crimes Unit of Maricopa County, Arizona went into full force on October 23, after reports of serious disruptions into the emergency 911 system for the entire Phoenix metro area.
In the high-stakes world of internet domains, .eco was a dream green prize -- and is now finally going online, Lisa Johnson reporting in CBC News.