Ajax loader

Can't find what you're looking for?

 

Be sure to Sign in to see all available content.

 

If you don't have an account, Register here.

Search results for: Computer-hacker

USA-CYBER/
RTXE0Z71 
July 05, 2021 
A 3D printed model of men working on computers are seen in front of displayed binary code and words "Hacker"... 
Zenica, Bosnia and Herzegovina 
A 3D printed model of men working on computers are seen in front of displayed binary code and words "Hacker\... 
A 3D printed model of men working on computers are seen in front of displayed binary code and words "Hacker" in this illustration taken, July 5, 2021. REUTERS/Dado Ruvic/Illustration 
CYBER-CONFERENCE/ELECTION-HACKING
RTX3DCFI 
July 28, 2017 
People pull apart computers used in voting machines in a bid to uncover security bugs during a "hacker... 
Las Vegas, UNITED STATES 
People pull apart computers used in voting machines in a bid to uncover security bugs during a "hacker... 
People pull apart computers used in voting machines in a bid to uncover security bugs during a "hacker voting village" exercise at the Def Con hacking conference in Las Vegas, Nevada, July 28, 2017. REUTERS/Jim Finkle 
CYBER-ATTACK/
RTX35OSK 
May 13, 2017 
A hooded man holds laptop computer as cyber code is projected on him in this illustration picture taken... 
Warsaw, Poland 
Hooded man holds laptop computer as cyber code is projected on him in this illustration picture 
A hooded man holds laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35OSE 
May 13, 2017 
A hooded man holds a laptop computer as blue screen with an exclamation mark is projected on him in this... 
Warsaw, Poland 
Hooded man holds laptop computer as blue screen with an exclamation mark is projected on him in this... 
A hooded man holds a laptop computer as blue screen with an exclamation mark is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35OSB 
May 13, 2017 
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken... 
Warsaw, Poland 
Hooded an holds laptop computer as cyber code is projected on him in this illustration picture 
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration TPX IMAGES OF THE DAY 
CYBER-ATTACK/
RTX35OS3 
May 13, 2017 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on... 
Warsaw, Poland 
Man holds laptop computer as cyber code is projected on him in this illustration picture 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35OS1 
May 13, 2017 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on... 
Warsaw, Poland 
Man holds laptop computer as cyber code is projected on him in this illustration picture 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35OS0 
May 13, 2017 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on... 
Warsaw, Poland 
Man holds laptop computer as cyber code is projected on him in this illustration picture 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35ORW 
May 13, 2017 
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken... 
Warsaw, Poland 
Hooded man holds laptop computer as cyber code is projected on him in this illustration picture 
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35ORT 
May 13, 2017 
A projection of cyber code on a hooded man is pictured in this illustration picture taken on May 13,... 
Warsaw, Poland 
Projection of cyber code on hooded man is pictured in this illustration picture 
A projection of cyber code on a hooded man is pictured in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration TPX IMAGES OF THE DAY 
CYBER-ATTACK/
RTX35ORR 
May 13, 2017 
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken... 
Warsaw, Poland 
Hooded man holds a laptop computer as cyber code is projected on him in this illustration picture 
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS/Kacper Pempel/Illustration 
GERMANY-CONFERENCE/
RTX2WRCL 
December 28, 2016 
The word "Hacklabor" (Hacker Laboratory) is seen during the 33th Chaos Communication congress, organized... 
Hamburg, Germany 
33th Chaos Communication congress in Hamburg 
The word "Hacklabor" (Hacker Laboratory) is seen during the 33th Chaos Communication congress, organized by the Chaos Computer Club, in Hamburg, Germany December 28, 2016. REUTERS/Fabian Bimmer 
USA-JUSTICE/CARLIN
RTSPQGD 
September 27, 2016 
FILE PHOTO: U.S. Assistant Attorney General for National Security John Carlin addresses a news conference... 
Washington, UNITED STATES 
U.S. Assistant Attorney General for National Security John Carlin addresses a news conference to announce... 
FILE PHOTO: U.S. Assistant Attorney General for National Security John Carlin addresses a news conference to announce indictments on Iranian computer hackers, in Washington March 24, 2016. REUTERS/Jonathan Ernst/File Photo 
USA-ELECTION/HACK
RTX2G8IP 
June 14, 2016 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian... 
Washington, UNITED STATES 
The headquarters of the Democratic National Committee is seen in Washington 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday. REUTERS/Gary Cameron 
USA-ELECTION/HACK
RTX2G8IO 
June 14, 2016 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian... 
Washington, UNITED STATES 
The headquarters of the Democratic National Committee is seen in Washington 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday. REUTERS/Gary Cameron 
USA-ELECTION/HACK
RTX2G8IN 
June 14, 2016 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian... 
Washington, UNITED STATES 
The headquarters of the Democratic National Committee is seen in Washington 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday. REUTERS/Gary Cameron 
USA-ELECTION/HACK
RTX2G8II 
June 14, 2016 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian... 
Washington, UNITED STATES 
The headquarters of the Democratic National Committee is seen in Washington 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday. REUTERS/Gary Cameron 
ISRAEL-PALESTINIANS/CYBERCRIME
RTX29E9B 
April 11, 2016 
Madj Oweida, 22, (C) a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with... 
Beersheba, Israel 
Oweida, a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with breaking... 
Madj Oweida, 22, (C) a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with breaking into Israeli military drone camera systems for Islamic militants and gleaning details of civilian aircraft movements, attends a court hearing at Beersheba district court in southern Israel, April 11, 2016. REUTERS/Amir Cohen
ISRAEL-PALESTINIANS/CYBERCRIME
RTX29E9A 
April 11, 2016 
Madj Oweida, 22, a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with... 
Beersheba, Israel 
Oweida, a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with breaking... 
Madj Oweida, 22, a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with breaking into Israeli military drone camera systems for Islamic militants and gleaning details of civilian aircraft movements, attends a court hearing at Beersheba district court in southern Israel, April 11, 2016. REUTERS/Amir Cohen
USA-CRIME/
RTX21KFO 
January 08, 2016 
Former hedge fund manager Vitaly Korchevsky (2nd R) leaves Brooklyn Federal Court in the Brooklyn borough... 
New York, UNITED STATES 
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of... 
Former hedge fund manager Vitaly Korchevsky (2nd R) leaves Brooklyn Federal Court in the Brooklyn borough of New York, January 8, 2016. Korchevsky, a former hedge fund manager turned pastor from Pennsylvania, is charged with other suspects for taking part in an insider trading scheme by stock traders and computer hackers in Ukraine. REUTERS/Brendan McDermid
USA-CRIME/
RTX21KFM 
January 08, 2016 
Former hedge fund manager Vitaly Korchevsky (L) leaves Brooklyn Federal Court in the Brooklyn borough... 
New York, UNITED STATES 
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of... 
Former hedge fund manager Vitaly Korchevsky (L) leaves Brooklyn Federal Court in the Brooklyn borough of New York, January 8, 2016. Korchevsky, a former hedge fund manager turned pastor in Pennsylvania, is charged with other suspects for taking part in an insider trading scheme by stock traders and computer hackers in Ukraine. REUTERS/Brendan McDermid
USA-CRIME/
RTX21KFK 
January 08, 2016 
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of... 
New York, UNITED STATES 
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of... 
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of New York, January 8, 2016. Korchevsky, a former hedge fund manager turned pastor from Pennsylvania, is charged with other suspects for taking part in an insider trading scheme by stock traders and computer hackers in Ukraine. REUTERS/Brendan McDermid
USA-CRIME/
RTX21KFI 
January 08, 2016 
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of... 
New York, UNITED STATES 
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of... 
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of New York, January 8, 2016. Korchevsky, a former hedge fund manager turned pastor from Pennsylvania, is charged with other suspects for taking part in an insider trading scheme by stock traders and computer hackers in Ukraine. REUTERS/Brendan McDermid
USA-CRIME/
RTX21KFB 
January 08, 2016 
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of... 
New York, UNITED STATES 
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of... 
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of New York, January 8, 2016. Korchevsky, a former hedge fund manager turned pastor from Pennsylvania, is charged with other suspects for taking part in an insider trading scheme by stock traders and computer hackers in Ukraine. REUTERS/Brendan McDermid
MALAYSIA-ISLAMIC-STATE/
RTS4UAZ 
October 17, 2015 
A man types on a keyboard in front of the logo of "Kosova Hackers Security" in this photo illustration... 
Sarajevo, Bosnia and Herzegovina 
A man types on a keyboard in front of the logo of "Kosova Hackers Security" in this photo illustration... 
A man types on a keyboard in front of the logo of "Kosova Hackers Security" in this photo illustration taken in Sarajevo, Bosnia and Herzegovina, October 16, 2015. At the request of the United States, Malaysia has arrested a man on charges of hacking personal data of more than a thousand U.S. officials and handing it to Islamic State militants in Syria so they could target the individuals. The man, 20-year-old Ardit Ferizi from Kosovo, who entered Malaysia in August 2014 to study computer science and forensics, will be extradited to the United States, police said on Thursday night. Picture taken October 16, 2015. REUTERS/Dado Ruvic 
ASHLEYMADISON-HACK/OTTAWA
RTX1L9H3 
July 21, 2015 
The homepage of the Ashley Madison website is displayed on an iPad, in this photo illustration taken... 
Ottawa, Canada 
Homepage of Ashley Madison website displayed on iPad, in photo illustration taken in Ottawa 
The homepage of the Ashley Madison website is displayed on an iPad, in this photo illustration taken in Ottawa, Canada July 21, 2015. Canada's prim capital is suddenly focused more on the state of people's affairs than the affairs of the state. One in five Ottawa residents allegedly subscribed to adulterers' website Ashley Madison, making one of the world's coldest capitals among the hottest for extra-marital hookups - and the most vulnerable to a breach of privacy after hackers targeted the site. REUTERS/Chris Wattie 
ASHLEYMADISON-CYBERSECURITY/
RTX1L9GJ 
July 21, 2015 
The homepage of the Ashley Madison website is displayed on an iPad, in this photo illustration taken... 
Ottawa, Canada 
Homepage of Ashley Madison website displayed on iPad, in photo illustration taken in Ottawa 
The homepage of the Ashley Madison website is displayed on an iPad, in this photo illustration taken in Ottawa, Canada July 21, 2015. Cheating spouses website AshleyMadison.com, facing hackers' threats to leak clients' nude photos and sexual fantasies, said it is heartened by some initial public response that sees the site as a victim. The website's Canadian parent, Avid Life Media, confirmed a breach of its systems that has put the real names, credit card information and other details of as many as 37 million customers at risk. Avid Life said it has since secured the sites and closed unauthorized access points. REUTERS/Chris Wattie 
Technology
Technology 
Cyber Security - 05 Jun 2015 
16 PICTURES 
BRAZIL-SCIENCE/
RTR4O940 
February 04, 2015 
A participating family stands in front of their tent in the camping area of the Campus Party event in... 
Sao Paulo, Brazil 
A participating family stands in front of their tent in the camping area of the Campus Party event in... 
A participating family stands in front of their tent in the camping area of the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY) 
BRAZIL-SCIENCE/
RTR4O93Y 
February 04, 2015 
Participants play in a Formula One car simulator during the Campus Party event in Sao Paulo February... 
Sao Paulo, Brazil 
Participants play in a Formula One car simulator during the Campus Party event in Sao Paulo 
Participants play in a Formula One car simulator during the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY) 
BRAZIL-SCIENCE/
RTR4O93R 
February 04, 2015 
A participant plays in a Formula One car simulator during the Campus Party event in Sao Paulo February... 
Sao Paulo, Brazil 
A participant plays in a Formula One car simulator during the Campus Party event in Sao Paulo 
A participant plays in a Formula One car simulator during the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY) 
BRAZIL-SCIENCE/
RTR4O93M 
February 04, 2015 
Participants attend the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long,... 
Sao Paulo, Brazil 
Participants attend the Campus Party event in Sao Paulo 
Participants attend the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY) 
BRAZIL-SCIENCE/
RTR4O93J 
February 04, 2015 
A participant walks in the camping area of the Campus Party event in Sao Paulo February 4, 2015. Campus... 
Sao Paulo, Brazil 
A participant walks in the camping area of the Campus Party event in Sao Paulo 
A participant walks in the camping area of the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY) 
BRAZIL-SCIENCE/
RTR4O939 
February 04, 2015 
Participants attend the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long,... 
Sao Paulo, Brazil 
Participants attend the Campus Party event in Sao Paulo 
Participants attend the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY) 
BRAZIL-SCIENCE/
RTR4O936 
February 04, 2015 
A participant eats food inside his tent in the camping area of the Campus Party event in Sao Paulo February... 
Sao Paulo, Brazil 
A participant eats food inside his tent in the camping area of the Campus Party event in Sao Paulo 
A participant eats food inside his tent in the camping area of the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY) 
BRAZIL-SCIENCE/
RTR4O92T 
February 04, 2015 
Participants work on a customised computer at Campus Party event in Sao Paulo February 4, 2015. Campus... 
Sao Paulo, Brazil 
Participants work on a customised computer at Campus Party event in Sao Paulo 
Participants work on a customised computer at Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY) 
BRAZIL-SCIENCE/
RTR4O92Q 
February 04, 2015 
A participant walks in the camping area of the Campus Party event in Sao Paulo February 4, 2015. Campus... 
Sao Paulo, Brazil 
A participant walks in the camping area of the Campus Party event in Sao Paulo 
A participant walks in the camping area of the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY) 
CYBERSECURITY-CENTCOM/HACK
RTR4L5BJ 
January 12, 2015 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people... 
Washington, UNITED STATES 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people... 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people claiming to be Islamic State sympathizers January 12, 2015. The hackers published apparent intelligence material and what they said were names and addresses of military personnel. REUTERS/Staff (UNITED STATES - Tags: MILITARY CRIME LAW POLITICS) 
CYBERSECURITY-CENTCOM/HACK
RTR4L5BH 
January 12, 2015 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people... 
Washington, UNITED STATES 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people... 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people claiming to be Islamic State sympathizers January 12, 2015. The hackers published apparent intelligence material and what they said were names and addresses of military personnel. REUTERS/Staff (UNITED STATES - Tags: MILITARY CRIME LAW POLITICS) 
CYBERSECURITY-CENTCOM/HACK
RTR4L5BG 
January 12, 2015 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people... 
Washington, UNITED STATES 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people... 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people claiming to be Islamic State sympathizers January 12, 2015. The hackers published apparent intelligence material and what they said were names and addresses of military personnel. REUTERS/Staff (UNITED STATES - Tags: MILITARY CRIME LAW POLITICS) 
Technology
Technology 
Black Hat USA - 07 Aug 2014 
20 PICTURES 
CYBERSECURITY-HACKING/
RTR41I0F 
August 07, 2014 
People dressed as Vikings pose in front of the Norse booth during the Black Hat USA 2014 hacker conference... 
Las Vegas, UNITED STATES 
People dressed as Vikings pose in front of the Norse booth during the Black Hat USA 2014 hacker conference... 
People dressed as Vikings pose in front of the Norse booth during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. Norse is a computer security company that provides live attack intelligence. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY BUSINESS) 
News
News 
Espionage Case Heightens China-Canada Tensions - 07 Aug 2014 
8 PICTURES 
CYBERSECURITY-HACKING/
RTR41HX3 
August 06, 2014 
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker... 
Las Vegas, UNITED STATES 
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker... 
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS) 
CYBERSECURITY-HACKING/
RTR41HX1 
August 06, 2014 
An image of Chinese military officer Sun Kailiang is displayed as computer security expert Mikko Hypponen... 
Las Vegas, UNITED STATES 
An image of Chinese military officer Sun Kailiang is displayed as computer security expert Hypponen of... 
An image of Chinese military officer Sun Kailiang is displayed as computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during a briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. Sun Kailiang is one of five Chinese military officers accused of hacking into American companies. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY CRIME LAW POLITICS BUSINESS) 
CYBERSECURITY-HACKING/
RTR41HWI 
August 06, 2014 
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next... 
Las Vegas, UNITED STATES 
Computer security expert Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation"... 
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS) 
CYBERSECURITY-HACKING/
RTR41HWH 
August 06, 2014 
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next... 
Las Vegas, UNITED STATES 
Computer security expert Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation"... 
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS) 
CYBERSECURITY-HACKING/
RTR41HWG 
August 06, 2014 
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next... 
Las Vegas, UNITED STATES 
Computer security expert Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation"... 
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS) 
CYBERSECURITY-HACKING/
RTR41HIK 
August 06, 2014 
Christopher Valasek (L) and Charlie Miller talk about hacking into vehicle computer systems during the... 
Las Vegas, UNITED STATES 
Christopher Valasek and Charlie Miller talk about hacking into vehicle computer systems during the Black... 
Christopher Valasek (L) and Charlie Miller talk about hacking into vehicle computer systems during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY) 
CYBERSECURITY-HACKING/
RTR41HIJ 
August 06, 2014 
Christopher Valasek (L) and Charlie Miller talk about hacking into vehicle computer systems during the... 
Las Vegas, UNITED STATES 
Christopher Valasek and Charlie Miller talk about hacking into vehicle computer systems during the Black... 
Christopher Valasek (L) and Charlie Miller talk about hacking into vehicle computer systems during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY) 
CYBERSECURITY-HACKING/
RTR41H1N 
August 06, 2014 
Speaker liaison Genevieve Netter is silhouetted against a Black Hat logo during the Black Hat USA 2014... 
Las Vegas, UNITED STATES 
Speaker liaison Genevieve Netter is silhouetted against a Black Hat logo during the Black Hat USA 2014... 
Speaker liaison Genevieve Netter is silhouetted against a Black Hat logo during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY TPX IMAGES OF THE DAY) 
CYBERSECURITY-HACKERS/
RTR41DIB 
August 06, 2014 
Tani Currin, marketing events manager for computer security software and hardware developer Sophos, holds... 
Las Vegas, UNITED STATES 
Currin, marketing events manager for Sophos, holds an "anti-selfie" mask during the Black Hat USA 2014... 
Tani Currin, marketing events manager for computer security software and hardware developer Sophos, holds an "anti-selfie" mask during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 5, 2014. The mask is part of a privacy awareness marketing campaign, she said. Sophos is a developer of computer security software and hardware. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY BUSINESS SOCIETY) 
CANADA-CRIME/
RTR3ZVGP 
July 23, 2014 
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver... 
Vancouver, Canada 
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver... 
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver July 23, 2014. The U.S. Department of Justice has charged Su, a Chinese businessman who resides in Canada, with hacking into the computer systems of Boeing and other companies in order to obtain data about military projects, according to court filings. U.S. prosecutors based in Los Angeles allege Su helped guide unidentified computer hackers in China on what technology they should procure from American company computer networks, the criminal complaint said. REUTERS/Ben Nelms (CANADA - Tags: CRIME LAW) 
CANADA-CRIME/
RTR3ZVGO 
July 23, 2014 
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver... 
Vancouver, Canada 
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver... 
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver July 23, 2014. The U.S. Department of Justice has charged Su, a Chinese businessman who resides in Canada, with hacking into the computer systems of Boeing and other companies in order to obtain data about military projects, according to court filings. U.S. prosecutors based in Los Angeles allege Su helped guide unidentified computer hackers in China on what technology they should procure from American company computer networks, the criminal complaint said. REUTERS/Ben Nelms (CANADA - Tags: CRIME LAW) 
CANADA-CRIME/
RTR3ZVG9 
July 23, 2014 
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver... 
Vancouver, Canada 
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver... 
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver July 23, 2014. The U.S. Department of Justice has charged Su, a Chinese businessman who resides in Canada, with hacking into the computer systems of Boeing and other companies in order to obtain data about military projects, according to court filings. U.S. prosecutors based in Los Angeles allege Su helped guide unidentified computer hackers in China on what technology they should procure from American company computer networks, the criminal complaint said. REUTERS/Ben Nelms (CANADA - Tags: CRIME LAW) 
CANADA-CRIME/
RTR3ZVG8 
July 23, 2014 
Mark Jette (C), lawyer for Su Bin, stands near members of the media after Su was denied bail during a... 
Vancouver, Canada 
Mark Jette, lawyer for Su Bin, stands near members of the media after Su was denied bail during a hearing... 
Mark Jette (C), lawyer for Su Bin, stands near members of the media after Su was denied bail during a hearing in Vancouver July 23, 2014. The U.S. Department of Justice has charged Su, a Chinese businessman who resides in Canada, with hacking into the computer systems of Boeing and other companies in order to obtain data about military projects, according to court filings. U.S. prosecutors based in Los Angeles allege Su helped guide unidentified computer hackers in China on what technology they should procure from American company computer networks, the criminal complaint said. REUTERS/Ben Nelms (CANADA - Tags: CRIME LAW MEDIA) 
IRAN-HACKERS/
RTR3RE1D 
May 29, 2014 
A portion of the homepage of Newsonair.com is shown on a computer screen in Toronto, Ontario May 28,... 
Toronto, Canada 
A portion of the homepage of Newsonair.com is shown on a computer screen in Toronto 
A portion of the homepage of Newsonair.com is shown on a computer screen in Toronto, Ontario May 28, 2014. In an unprecedented, three-year cyber espionage campaign, Iranian hackers created false social networking accounts and a fake news website to spy on military and political leaders in the United States, Israel and other countries, a Dallas-based cyber intelligence firm, Isight Partners, said May 29, 2014. REUTERS/Chris Helgren (CANADA - Tags: CRIME LAW POLITICS MILITARY) 
Technology
Technology 
eBay Hacked - 22 May 2014 
11 PICTURES 
TECH-CYBERSECURITY/SHIPPING
RTR3MDE8 
April 23, 2014 
Cargo vessels pass the waters outside Sentosa island in Singapore April 22, 2014. The next hacker playground:... 
Singapore, Singapore 
Cargo vessels pass the waters outside Sentosa island in Singapore 
Cargo vessels pass the waters outside Sentosa island in Singapore April 22, 2014. The next hacker playground: the open seas - and the oil tankers and container vessels that ship 90 percent of the goods moved around the planet. In this internet age, as more devices are hooked up online, so they become more vulnerable to attack. As industries like maritime and energy connect ships, containers and rigs to computer networks, they expose weaknesses that hackers can exploit. Picture taken April 22, 2014. REUTERS/Edgar Su (SINGAPORE - Tags: MARITIME BUSINESS) 
TECH-CYBERSECURITY/SHIPPING
RTR3MDE6 
April 23, 2014 
Cargo vessels pass the waters outside Sentosa island in Singapore April 22, 2014. The next hacker playground:... 
Singapore, Singapore 
Cargo vessels pass the waters outside Sentosa island in Singapore 
Cargo vessels pass the waters outside Sentosa island in Singapore April 22, 2014. The next hacker playground: the open seas - and the oil tankers and container vessels that ship 90 percent of the goods moved around the planet. In this internet age, as more devices are hooked up online, so they become more vulnerable to attack. As industries like maritime and energy connect ships, containers and rigs to computer networks, they expose weaknesses that hackers can exploit. Picture taken April 22, 2014. REUTERS/Edgar Su (SINGAPORE - Tags: MARITIME BUSINESS) 
Sort by 
Display 
Items per page 
Page 
of 5