South Redford schools are closed after a cyber attack. The district said that the administration is trying to resolve the attack on the district’s resources.
Continue ReadingVideos
Stonnington Council Cyber-Attack
Stonnington council has been targeted in a cyber-attack, exposing ratepayers’ private information.
Continue ReadingBrooklyn Hospitals Cyberattack
Demand for help at Brookdale Hospital, one of three hospitals without a computer network following a cyberattack.
Continue ReadingSuffolk County Cyber Attackers
Cyber Attackers who wreaked havoc in Suffolk County’s computer networks allegedly demanded $2.5M in ransom from the county.
Continue ReadingUS Vulnerable to Cyber-Attacks
A rare look inside the U.S. Cyber Command whose mission is to protect the country against foreign cyber-attacks and to use cyber weapons.
Continue ReadingHow Hackers Rob ATM’s
Hacked ATM’s, millions of dollars and mysterious software. This is the story of jackpotting, ploutus and the gigantic Carbanak Hack.
Continue ReadingControl of the Internet
The Hacker Crackdown an 18-month long collaborative effort of the United States Secret Service and AT&T to take control of the Internet in the early 1990s.
Continue ReadingAmazon and Collecting Data
No company stores more data than Amazon. Every second Euro in online trading is spent at Amazon.
Continue ReadingKim Dotcom and MegaUpload
Tech entrepreneur and owner of the popular file-sharing site, MegaUpload, Kim Dotcom arrived in New Zealand with his family in late 2010.
Continue ReadingCyberwars Invisible Warfare
Today hackers have become veritable covert foot soldiers of the state, leading the cyberwars of tomorrow.
Continue Reading2022’s Cyber Stories
Jill Aitoro, CyberRisk Alliance, and Ross Wilkers, reporter for Washington Technology, discuss this year’s top stories in tech and cyber news.
Continue ReadingTelstra Data Breach
Telstra has apologized to thousands of people whose data was published online.
Continue ReadingFire Rescue Victoria Cyber Attack
Fire Rescue Victoria will have to operate manually for the foreseeable future after a suspected cyber attack comprised the agency’s dispatch system.
Continue Reading








