Ajax loader

Can't find what you're looking for?

 

Be sure to Sign in to see all available content.

 

If you don't have an account, Register here.

Search results for: Computer-hacking

EL SALVADOR-SURVEILLANCE/
RTS4GZT2 
January 11, 2022 
Julia Gavarrete, an investigative reporter with El Faro who had two phones hacked for a total of 18 times,... 
San Salvador, El Salvador 
Salvadoran journalists' phones hacked with spyware, report finds 
Julia Gavarrete, an investigative reporter with El Faro who had two phones hacked for a total of 18 times, including data extracted from her personal phone, works on her computer at the offices of El Faro, in San Salvador, El Salvador January 11, 2022. Picture taken January 11, 2022. REUTERS/Jessica Orellana 
EL SALVADOR-SURVEILLANCE/
RTS4GZNR 
January 11, 2022 
Julia Gavarrete, an investigative reporter with El Faro who had two phones hacked a total of 18 times,... 
San Salvador, El Salvador 
Salvadoran journalists' phones hacked with spyware, report finds 
Julia Gavarrete, an investigative reporter with El Faro who had two phones hacked a total of 18 times, including data extracted from her personal phone, works on her computer at the offices of El Faro, in San Salvador, El Salvador January 11, 2022. Picture taken January 11, 2022. REUTERS/Jessica Orellana 
TWITTER-DORSEY/
RTS2OJFD 
August 30, 2019 
A message from the Twitter communications department confirming the hacking of co-founder and CEO Jack... 
Washington, UNITED STATES 
Message from Twitter communications department confirming the hacking of founder and CEO Jack Dorsey's... 
A message from the Twitter communications department confirming the hacking of co-founder and CEO Jack Dorsey's Twitter account and his postings is seen on a mobile phone held in front of Dorsey's twitter feed displayed on a computer screen in this photo illustration taken in Washington, U.S. August 30, 2019. REUTERS/Jim Bourg 
USA-BALTIMORE/
RTS2HI5C 
May 13, 2019 
A sign referring to the hacked computer system of Baltimore City is taped to a door near Baltimore City... 
Baltimore, UNITED STATES 
A sign referring to the hacked computer system of Baltimore City is taped to a door near Baltimore City... 
A sign referring to the hacked computer system of Baltimore City is taped to a door near Baltimore City Hall in Baltimore, Maryland, U.S. May 10, 2019. Picture taken May 10, 2019. REUTERS/Stephanie Keith 
USA-BALTIMORE/
RTS2HI5A 
May 13, 2019 
A sign referring to the hacked computer system of Baltimore City is taped to a door near Baltimore City... 
Baltimore, UNITED STATES 
A sign referring to the hacked computer system of Baltimore City is taped to a door near Baltimore City... 
A sign referring to the hacked computer system of Baltimore City is taped to a door near Baltimore City Hall in Baltimore, Maryland, U.S. May 10, 2019. REUTERS/Stephanie Keith 
ECUADOR-WIKILEAKS/
RTX6U5BK 
May 02, 2019 
Dag Gustafsson (L) greets his son Ola Bini, a Swedish software developer, at court after a local judge... 
Quito, Ecuador 
Dag Gustafsson greets his son Ola Bini, a Swedish software developer, at court after a local judge ordered... 
Dag Gustafsson (L) greets his son Ola Bini, a Swedish software developer, at court after a local judge ordered him jailed for alleged involvement in hacking government computer systems, in Quito, Ecuador May 2, 2019. REUTERS/Daniel Tapia 
ECUADOR-WIKILEAKS/
RTX6U5BG 
May 02, 2019 
Gorel Biniel hugs her son Ola Bini, a Swedish software developer, at court after a local judge ordered... 
Quito, Ecuador 
Gorel Biniel hugs her son Ola Bini, a Swedish software developer, at court after a local judge ordered... 
Gorel Biniel hugs her son Ola Bini, a Swedish software developer, at court after a local judge ordered him jailed for alleged involvement in hacking government computer systems, in Quito, Ecuador May 2, 2019. REUTERS/Daniel Tapia 
ECUADOR-WIKILEAKS/
RTX6U5BD 
May 02, 2019 
Swedish software developer Ola Bini (L) sits at court after a local judge ordered him jailed for alleged... 
Quito, Ecuador 
Swedish software developer Ola Bini sits at court after a local judge ordered him jailed for alleged... 
Swedish software developer Ola Bini (L) sits at court after a local judge ordered him jailed for alleged involvement in hacking government computer systems, in Quito, Ecuador May 2, 2019. REUTERS/Daniel Tapia 
ECUADOR-WIKILEAKS/
RTX6U5BA 
May 02, 2019 
Swedish software developer Ola Bini (C) arrives at court after a local judge ordered him jailed for alleged... 
Quito, Ecuador 
Swedish software developer Ola Bini arrives at court after a local judge ordered him jailed for alleged... 
Swedish software developer Ola Bini (C) arrives at court after a local judge ordered him jailed for alleged involvement in hacking government computer systems, in Quito, Ecuador May 2, 2019. REUTERS/Daniel Tapia 
ECUADOR-WIKILEAKS/
RTX6U5B8 
May 02, 2019 
Swedish software developer Ola Bini (L) arrives at court after a local judge ordered him jailed for alleged... 
Quito, Ecuador 
Swedish software developer Ola Bini arrives at court after a local judge ordered him jailed for alleged... 
Swedish software developer Ola Bini (L) arrives at court after a local judge ordered him jailed for alleged involvement in hacking government computer systems, in Quito, Ecuador May 2, 2019. REUTERS/Daniel Tapia 
CYBER-CONFERENCE/ELECTION-HACKING
RTX3DCFI 
July 28, 2017 
People pull apart computers used in voting machines in a bid to uncover security bugs during a "hacker... 
Las Vegas, UNITED STATES 
People pull apart computers used in voting machines in a bid to uncover security bugs during a "hacker... 
People pull apart computers used in voting machines in a bid to uncover security bugs during a "hacker voting village" exercise at the Def Con hacking conference in Las Vegas, Nevada, July 28, 2017. REUTERS/Jim Finkle 
CYBER-ATTACK/
RTX35OS3 
May 13, 2017 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on... 
Warsaw, Poland 
Man holds laptop computer as cyber code is projected on him in this illustration picture 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35OS1 
May 13, 2017 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on... 
Warsaw, Poland 
Man holds laptop computer as cyber code is projected on him in this illustration picture 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35OS0 
May 13, 2017 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on... 
Warsaw, Poland 
Man holds laptop computer as cyber code is projected on him in this illustration picture 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35ORW 
May 13, 2017 
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken... 
Warsaw, Poland 
Hooded man holds laptop computer as cyber code is projected on him in this illustration picture 
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35ORT 
May 13, 2017 
A projection of cyber code on a hooded man is pictured in this illustration picture taken on May 13,... 
Warsaw, Poland 
Projection of cyber code on hooded man is pictured in this illustration picture 
A projection of cyber code on a hooded man is pictured in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration TPX IMAGES OF THE DAY 
CYBER-ATTACK/
RTX35ORR 
May 13, 2017 
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken... 
Warsaw, Poland 
Hooded man holds a laptop computer as cyber code is projected on him in this illustration picture 
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS/Kacper Pempel/Illustration 
MIDEAST-CRISIS/SYRIA-GERMANY-ARTIST
RTS15UPM 
May 09, 2017 
A computer screen shows Aleppo's destruction projected on a Berlin map, in the office of data visualiser... 
Berlin, Germany 
A computer screen shows Aleppo's destruction projected on a Berlin map, in the office of data visualiser... 
A computer screen shows Aleppo's destruction projected on a Berlin map, in the office of data visualiser Hans Hack in Berlin, Germany, May 3, 2017. Picture taken May 3, 2017. REUTERS/Fabrizio Bensch 
MIDEAST-CRISIS/SYRIA-GERMANY-ARTIST
RTS15UPI 
May 09, 2017 
Data visualiser Hans Hack points to a computer screen showing Aleppo's destruction projected on a London... 
Berlin, Germany 
Data visualiser Hans Hack points to a computer screen showing Aleppo's destruction projected on a London... 
Data visualiser Hans Hack points to a computer screen showing Aleppo's destruction projected on a London map, in Berlin, Germany May 3, 2017. Picture taken May 3, 2017. REUTERS/Fabrizio Bensch 
MIDEAST-CRISIS/SYRIA-GERMANY-ARTIST
RTS15UPG 
May 09, 2017 
Data visualiser Hans Hack poses at his desk in front of a computer screen showing Aleppo's destruction... 
Berlin, Germany 
Data visualiser Hans Hack poses at his desk in front of a computer screen showing Aleppo's destruction... 
Data visualiser Hans Hack poses at his desk in front of a computer screen showing Aleppo's destruction projected on a Berlin map, in Berlin, Germany May 3, 2017. Picture taken May 3, 2017. REUTERS/Fabrizio Bensch 
USA-CIA-BRENNAN
RTX2RIZS 
November 02, 2016 
Part of the building of 'Unit 61398', a secretive Chinese military unit, is seen in the outskirts of... 
Shanghai, China 
Part of the building of 'Unit 61398', a secretive Chinese military unit, is seen in the outskirts of... 
Part of the building of 'Unit 61398', a secretive Chinese military unit, is seen in the outskirts of Shanghai February 19, 2013. The unit is believed to be behind a series of hacking attacks, a U.S. computer security company said, prompting a strong denial by China and accusations that it was in fact the victim of U.S. hacking. To match Special Report USA-CIA-BRENNAN/ REUTERS/Carlos Barria/File Photo 
USA-ELECTION/HACK
RTX2G8IP 
June 14, 2016 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian... 
Washington, UNITED STATES 
The headquarters of the Democratic National Committee is seen in Washington 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday. REUTERS/Gary Cameron 
USA-ELECTION/HACK
RTX2G8IO 
June 14, 2016 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian... 
Washington, UNITED STATES 
The headquarters of the Democratic National Committee is seen in Washington 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday. REUTERS/Gary Cameron 
USA-ELECTION/HACK
RTX2G8IN 
June 14, 2016 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian... 
Washington, UNITED STATES 
The headquarters of the Democratic National Committee is seen in Washington 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday. REUTERS/Gary Cameron 
USA-ELECTION/HACK
RTX2G8II 
June 14, 2016 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian... 
Washington, UNITED STATES 
The headquarters of the Democratic National Committee is seen in Washington 
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday. REUTERS/Gary Cameron 
CYBER-CELEBRITIES/COURT
RTSASTR 
March 17, 2016 
Actress Jennifer Lawrence arrives at the 88th Academy Awards nominees luncheon in Beverly Hills, California... 
Beverly Hills, UNITED STATES 
File photo of Jennifer Lawrence arriving at the 88th Academy Awards nominees luncheon in Beverly Hills... 
Actress Jennifer Lawrence arrives at the 88th Academy Awards nominees luncheon in Beverly Hills, California in this February 8, 2016, file photo. Ryan Collins, a Pennsylvania man, has agreed to plead guilty to a felony computer hacking charge after authorities said he illegally accessed private phone and email accounts of celebrities such as Oscar-winning actress Jennifer Lawrence to leak information including nude pictures. REUTERS/Mario Anzuoni/Files 
MALAYSIA-ISLAMIC-STATE/
RTS4UAZ 
October 17, 2015 
A man types on a keyboard in front of the logo of "Kosova Hackers Security" in this photo illustration... 
Sarajevo, Bosnia and Herzegovina 
A man types on a keyboard in front of the logo of "Kosova Hackers Security" in this photo illustration... 
A man types on a keyboard in front of the logo of "Kosova Hackers Security" in this photo illustration taken in Sarajevo, Bosnia and Herzegovina, October 16, 2015. At the request of the United States, Malaysia has arrested a man on charges of hacking personal data of more than a thousand U.S. officials and handing it to Islamic State militants in Syria so they could target the individuals. The man, 20-year-old Ardit Ferizi from Kosovo, who entered Malaysia in August 2014 to study computer science and forensics, will be extradited to the United States, police said on Thursday night. Picture taken October 16, 2015. REUTERS/Dado Ruvic 
USA-BLACK HAT/
RTX1N86M 
August 05, 2015 
Charlie Miller speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August... 
Las Vegas, UNITED STATES 
Charlie Miller speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas 
Charlie Miller speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Miller and Chris Valasek talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus 
USA-BLACK HAT/
RTX1N86L 
August 05, 2015 
Chris Valasek (L) and Charlie Miller applaud as they give a briefing during the Black Hat USA 2015 cybersecurity... 
Las Vegas, UNITED STATES 
Chris Valasek (L) and Charlie Miller applaud as they give a briefing during the Black Hat USA 2015 cybersecurity... 
Chris Valasek (L) and Charlie Miller applaud as they give a briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Valasek and Miller talked about how they remotely hacked into a Jeep Cherokee. REUTERS/Steve Marcus 
USA-BLACK HAT/
RTX1N86K 
August 05, 2015 
Chris Valasek speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August... 
Las Vegas, UNITED STATES 
Chris Valasek speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas 
Chris Valasek speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Valasek and Charlie Miller talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus 
USA-BLACK HAT/
RTX1N86J 
August 05, 2015 
Chris Valasek (L) and Charlie Miller give a briefing during the Black Hat USA 2015 cybersecurity conference... 
Las Vegas, UNITED STATES 
Chris Valasek (L) and Charlie Miller give a briefing during the Black Hat USA 2015 cybersecurity conference... 
Chris Valasek (L) and Charlie Miller give a briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Valasek and Miller talked about how they remotely hacked into a Jeep Cherokee. REUTERS/Steve Marcus 
USA-BLACK HAT/
RTX1N86F 
August 05, 2015 
Charlie Miller (L) and Chris Valasek give a briefing during the Black Hat USA 2015 cybersecurity conference... 
Las Vegas, UNITED STATES 
Charlie Miller (L) and Chris Valasek give a briefing during the Black Hat USA 2015 cybersecurity conference... 
Charlie Miller (L) and Chris Valasek give a briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Miller and Valasek talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus 
USA-BLACK HAT/
RTX1N86E 
August 05, 2015 
Attendees listen to a briefing by Charlie Miller and Chris Valasek during the Black Hat USA 2015 cybersecurity... 
Las Vegas, UNITED STATES 
Attendees listen to a briefing by Charlie Miller and Chris Valasek wait to give a briefing during the... 
Attendees listen to a briefing by Charlie Miller and Chris Valasek during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Miller and Valacek talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus 
USA-BLACK HAT/
RTX1N86A 
August 05, 2015 
Charlie Miller (L) and Chris Valasek wait to give a briefing during the Black Hat USA 2015 cybersecurity... 
Las Vegas, UNITED STATES 
Charlie Miller (L) and Chris Valasek wait to give a briefing during the Black Hat USA 2015 cybersecurity... 
Charlie Miller (L) and Chris Valasek wait to give a briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Miller and Valacek talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus 
USA-BLACK HAT/
RTX1N7TW 
August 05, 2015 
Colby Moore poses with a home-made reception box during a news conference at the Black Hat USA 2015 cybersecurity... 
Las Vegas, UNITED STATES 
Colby Moore poses with a home-made reception box during a news conference at the Black Hat USA 2015 cybersecurity... 
Colby Moore poses with a home-made reception box during a news conference at the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Moore spoke on hacking a satellite network. REUTERS/Steve Marcus 
USA-BLACK HAT/
RTX1N7TF 
August 05, 2015 
Colby Moore speaks on hacking a satellite network during at news conference at the Black Hat USA 2015... 
Las Vegas, UNITED STATES 
Colby Moore speaks on hacking a satellite network during at news conference at the Black Hat USA 2015... 
Colby Moore speaks on hacking a satellite network during at news conference at the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
USA-BLACK HAT/
RTX1N7TE 
August 05, 2015 
Colby Moore speaks at a briefing on hacking a satellite network during the Black Hat USA 2015 cybersecurity... 
Las Vegas, UNITED STATES 
Colby Moore speaks at a briefing on hacking a satellite network during the Black Hat USA 2015 cybersecurity... 
Colby Moore speaks at a briefing on hacking a satellite network during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
USA-BLACK HAT/
RTX1N7ST 
August 05, 2015 
Ang Cui of Red Balloon Security speaks at a "funtenna" briefing during the Black Hat USA 2015 cybersecurity... 
Las Vegas, UNITED STATES 
Ang Cui of Red Balloon Security speaks at a "funtenna" briefing during the Black Hat USA 2015 cybersecurity... 
Ang Cui of Red Balloon Security speaks at a "funtenna" briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Funtenna is a hack that can turn connected devices into antennas capable of transmitting data out of a network using audio waves. REUTERS/Steve Marcus 
USA-BLACK HAT/
RTX1N7SR 
August 05, 2015 
Ang Cui of Red Balloon Security speaks at a briefing titled "Emulate Like a Boss: Generalized Covert... 
Las Vegas, UNITED STATES 
Ang Cui of Red Balloon Security speaks at a briefing titled "Emulate Like a Boss: Generalized Covert... 
Ang Cui of Red Balloon Security speaks at a briefing titled "Emulate Like a Boss: Generalized Covert Data Exfiltration with Funtenna" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Funtenna is a hack that can turn connected devices into antennas capable of transmitting data out of a network using audio waves. REUTERS/Steve Marcus 
USA-BLACK HAT/
RTX1N7SQ 
August 05, 2015 
Ang Cui of Red Balloon Security speaks with attendees following a "funtenna" briefing during the Black... 
Las Vegas, UNITED STATES 
Ang Cui of Red Balloon Security speaks with attendees following a "funtenna" briefing during the Black... 
Ang Cui of Red Balloon Security speaks with attendees following a "funtenna" briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Funtenna is a hack that can turn connected devices into antennas capable of transmitting data out of a network using audio waves. REUTERS/Steve Marcus 
USA-BLACK HAT/
RTX1N7SP 
August 05, 2015 
Ang Cui of Red Balloon Security speaks a briefing titled "Emulate Like a Boss: Generalized Covert Data... 
Las Vegas, UNITED STATES 
Ang Cui of Red Balloon Security speaks a briefing titled "Emulate Like a Boss: Generalized Covert Data... 
Ang Cui of Red Balloon Security speaks a briefing titled "Emulate Like a Boss: Generalized Covert Data Exfiltration with Funtenna" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Funtenna is a hack that can turn connected devices into antennas capable of transmitting data out of a network using audio waves. REUTERS/Steve Marcus 
HACKING-ANTENNA/
RTX1N7ES 
August 05, 2015 
The Black Hat logo is displayed before a keynote address by Jennifer Granick, director of civil liberties... 
Las Vegas, UNITED STATES 
The Black Hat logo is displayed before a keynote address by Jennifer Granick, director of civil liberties... 
The Black Hat logo is displayed before a keynote address by Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
HACKING-ANTENNA/
RTX1N7ER 
August 05, 2015 
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las... 
Las Vegas, UNITED STATES 
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cyber security conference in Las... 
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
HACKING-ANTENNA/
RTX1N7EQ 
August 05, 2015 
Journalists, including Alice Tsuchiya (R) of Japan, listen to a keynote speech by Jennifer Granick, director... 
Las Vegas, UNITED STATES 
Journalists, including Alice Tsuchiya (R) of Japan, listen to a keynote speech by Jennifer Granick, director... 
Journalists, including Alice Tsuchiya (R) of Japan, listen to a keynote speech by Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
HACKING-ANTENNA/
RTX1N7EP 
August 05, 2015 
People arrive at the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015.... 
Las Vegas, UNITED STATES 
People arrive at Black Hat USA 2015 cybersecurity conference in Las Vegas 
People arrive at the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
HACKING-ANTENNA/
RTX1N7EO 
August 05, 2015 
People listen to a keynote address by Jennifer Granick, director of civil liberties at the Stanford Center... 
Las Vegas, UNITED STATES 
People listen to keynote address by Jennifer Granick, director of civil liberties at Stanford Center... 
People listen to a keynote address by Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
HACKING-ANTENNA/
RTX1N7EN 
August 05, 2015 
Jeff Moss,founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las... 
Las Vegas, UNITED STATES 
Jeff Moss,founder of Black Hat, speaks during the Black Hat USA 2015 cyber security conference in Las... 
Jeff Moss,founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
HACKING-ANTENNA/
RTX1N7EH 
August 05, 2015 
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las... 
Las Vegas, UNITED STATES 
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cyber security conference in Las... 
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
HACKING-ANTENNA/
RTX1N7EG 
August 05, 2015 
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers... 
Las Vegas, UNITED STATES 
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers... 
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers a keynote speech titled "The Lifecycle of a Revolution" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
HACKING-ANTENNA/
RTX1N7EE 
August 05, 2015 
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers... 
Las Vegas, UNITED STATES 
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers... 
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers a keynote speech titled "The Lifecycle of a Revolution" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
HACKING-ANTENNA/
RTX1N7ED 
August 05, 2015 
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers... 
Las Vegas, UNITED STATES 
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers... 
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers a keynote speech titled "The Lifecycle of a Revolution" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
HACKING-ANTENNA/
RTX1N7EC 
August 05, 2015 
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las... 
Las Vegas, UNITED STATES 
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cyber security conference in Las... 
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
HACKING-ANTENNA/
RTX1N7DT 
August 05, 2015 
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers... 
Las Vegas, UNITED STATES 
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers... 
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers a keynote speech titled "The Lifecycle of a Revolution" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus 
ASHLEYMADISON-HACK/OTTAWA
RTX1L9H3 
July 21, 2015 
The homepage of the Ashley Madison website is displayed on an iPad, in this photo illustration taken... 
Ottawa, Canada 
Homepage of Ashley Madison website displayed on iPad, in photo illustration taken in Ottawa 
The homepage of the Ashley Madison website is displayed on an iPad, in this photo illustration taken in Ottawa, Canada July 21, 2015. Canada's prim capital is suddenly focused more on the state of people's affairs than the affairs of the state. One in five Ottawa residents allegedly subscribed to adulterers' website Ashley Madison, making one of the world's coldest capitals among the hottest for extra-marital hookups - and the most vulnerable to a breach of privacy after hackers targeted the site. REUTERS/Chris Wattie 
Technology
Technology 
Cyber Security - 05 Jun 2015 
16 PICTURES 
USA-CYBERSECURITY/OBAMA-HOTEL
RTR4PM36 
February 15, 2015 
Flags fly over the entrance of the Fairmont hotel, where U.S. President Barack Obama stayed, in San Francisco... 
San Francisco, UNITED STATES 
Flags fly over the entrance of the Fairmont hotel, where U.S. President Barack Obama stayed, in San Francisco... 
Flags fly over the entrance of the Fairmont hotel, where U.S. President Barack Obama stayed, in San Francisco February 14, 2015. It may not have been a hacking, but a computer outage at the hotel where Obama resided this week could not have come at a more inconvenient time. The president flew to San Francisco on Thursday to preach the benefits of better corporate cybersecurity practices. The entire two days he was in town, the computer system at his upscale hotel, The Fairmont, was down.
REUTERS/Kevin Lamarque (UNITED STATES - Tags: POLITICS BUSINESS SCIENCE TECHNOLOGY) 
USA-CYBERSECURITY/OBAMA-HOTEL
RTR4PM35 
February 15, 2015 
Flags fly over the entrance of the Fairmont hotel, where U.S. President Barack Obama stayed, in San Francisco... 
San Francisco, UNITED STATES 
Flags fly over the entrance of the Fairmont hotel, where U.S. President Barack Obama stayed, in San Francisco... 
Flags fly over the entrance of the Fairmont hotel, where U.S. President Barack Obama stayed, in San Francisco February 14, 2015. It may not have been a hacking, but a computer outage at the hotel where Obama resided this week could not have come at a more inconvenient time. The president flew to San Francisco on Thursday to preach the benefits of better corporate cybersecurity practices. The entire two days he was in town, the computer system at his upscale hotel, The Fairmont, was down.
REUTERS/Kevin Lamarque (UNITED STATES - Tags: POLITICS BUSINESS SCIENCE TECHNOLOGY) 
USA-OBAMA/
RTR4PIGT 
February 13, 2015 
U.S. President Barack Obama looks up as he signs an Executive Order to encourage and promote sharing... 
Palo Alto, UNITED STATES 
Obama signs an Executive Order at the Summit on Cybersecurity and Consumer Protection in Palo Alto, California... 
U.S. President Barack Obama looks up as he signs an Executive Order to encourage and promote sharing of cybersecurity threat information within the private sector and between the private sector and government after speaking at the Summit on Cybersecurity and Consumer Protection at Stanford University in Palo Alta, California February 13, 2015. The aim of the summit is to build support for beefing up cyber security laws in the wake of massive hacked at Target, Sony and Anthem. REUTERS/Kevin Lamarque (UNITED STATES - Tags: POLITICS BUSINESS SCIENCE TECHNOLOGY TPX IMAGES OF THE DAY) 
CYBERSECURITY-CENTCOM/HACK
RTR4L5BJ 
January 12, 2015 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people... 
Washington, UNITED STATES 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people... 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people claiming to be Islamic State sympathizers January 12, 2015. The hackers published apparent intelligence material and what they said were names and addresses of military personnel. REUTERS/Staff (UNITED STATES - Tags: MILITARY CRIME LAW POLITICS) 
CYBERSECURITY-CENTCOM/HACK
RTR4L5BH 
January 12, 2015 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people... 
Washington, UNITED STATES 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people... 
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people claiming to be Islamic State sympathizers January 12, 2015. The hackers published apparent intelligence material and what they said were names and addresses of military personnel. REUTERS/Staff (UNITED STATES - Tags: MILITARY CRIME LAW POLITICS) 
Sort by 
Display 
Items per page 
Page 
of 5