Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy.

Can't find what you're looking for?

 

Be sure to Sign in to see all available content.

 

If you don't have an account, Register here.

Search results for: Cyber-warfare

ISRAEL-HACKERS/
RTS2NE0J
August 22, 2019
A man is reflected in a monitor as he takes part in a training session at Cybergym, a cyber-warfare training...
Hadera, Israel
A man is reflected in a monitor as he takes part in a training session at Cybergym, a cyber-warfare training...
A man is reflected in a monitor as he takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. Picture taken July 8, 2019. REUTERS/Ronen Zvulun
ISRAEL-HACKERS/
RTS2NDQG
August 22, 2019
Graffiti is seen near the logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric...
Hadera, Israel
Graffiti is seen near the logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric...
Graffiti is seen near the logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun
ISRAEL-HACKERS/
RTS2NDP4
August 22, 2019
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel...
Hadera, Israel
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel...
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun
ISRAEL-HACKERS/
RTS2NDP2
August 22, 2019
People take part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel...
Hadera, Israel
People take part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel...
People take part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun
ISRAEL-HACKERS/
RTS2NDP1
August 22, 2019
Ofir Hason, CEO of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation,...
Hadera, Israel
Ofir Hason, CEO of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation,...
Ofir Hason, CEO of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, looks on during an interview with Reuters at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun
ISRAEL-HACKERS/
RTS2NDOW
August 22, 2019
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel...
Hadera, Israel
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel...
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun
ISRAEL-HACKERS/
RTS2NDOV
August 22, 2019
The logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, is...
Hadera, Israel
The logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, is...
The logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, is seen at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun
ISRAEL-HACKERS/
RTS2NDOU
August 22, 2019
The logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, is...
Hadera, Israel
The logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, is...
The logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, is seen at their training center in Hadera, Israel July 8, 2019. Picture taken July 8, 2019. REUTERS/Ronen Zvulun
ISRAEL-HACKERS/
RTS2NDOS
August 22, 2019
A man is reflected in a monitor as he takes part in a training session at Cybergym, a cyber-warfare training...
Hadera, Israel
A man is reflected in a monitor as he takes part in a training session at Cybergym, a cyber-warfare training...
A man is reflected in a monitor as he takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun
ISRAEL-HACKERS/
RTS2NDOQ
August 22, 2019
A Guy Fawkes mask made popular by the movie "V for Vendetta", hangs on a wall in an office at Cybergym,...
Hadera, Israel
A Guy Fawkes mask made popular by the movie "V for Vendetta", hangs on a wall in an office at Cybergym,...
A Guy Fawkes mask made popular by the movie "V for Vendetta", hangs on a wall in an office at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun
ISRAEL-HACKERS/
RTS2NDOP
August 22, 2019
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel...
Hadera, Israel
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel...
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun
CYBER-ATTACK/BRITAIN
RTX35W56
May 15, 2017
Cables and computers are seen inside a data centre at an office in the heart of the financial district...
London, United Kingdom
Cables and computers are seen inside a data centre at an office in the heart of the financial district...
Cables and computers are seen inside a data centre at an office in the heart of the financial district in London, Britain May 15, 2017. REUTERS/Dylan Martinez
CYBER-ATTACK/BRITAIN
RTX35W55
May 15, 2017
Cables and computers are seen inside a data centre at an office in the heart of the financial district...
London, United Kingdom
Cables and computers are seen inside a data centre at an office in the heart of the financial district...
Cables and computers are seen inside a data centre at an office in the heart of the financial district in London, Britain May 15, 2017. REUTERS/Dylan Martinez
USA-CHINA/
RTX1S5Q4
September 24, 2015
Chinese President Xi Jinping receives a football jersey bearing his name as he visits football players...
Tacoma, UNITED STATES
Chinese President Xi Jinping receives a football jersey bearing his name as he visits football players...
Chinese President Xi Jinping receives a football jersey bearing his name as he visits football players at Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder
USA-CHINA/
RTX1S5Q2
September 24, 2015
Chinese President Xi Jinping receives a football jersey bearing his name as he visits football players...
Tacoma, UNITED STATES
Chinese President Xi Jinping receives a football jersey bearing his name as he visits football players...
Chinese President Xi Jinping receives a football jersey bearing his name as he visits football players at Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder
USA-CHINA/
RTX1S5OI
September 24, 2015
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington,...
Tacoma, UNITED STATES
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington...
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder
USA-CHINA/
RTX1S5IP
September 24, 2015
Chinese First Lady Peng Liyuan visits Lincoln High School in Tacoma, Washington, September 23, 2015....
Tacoma, UNITED STATES
Chinese First Lady Peng Liyuan visits Lincoln High School in Tacoma, Washington
Chinese First Lady Peng Liyuan visits Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder
USA-CHINA/
RTX1S5I4
September 24, 2015
Chinese First Lady Peng Liyuan visits Lincoln High School in Tacoma, Washington, September 23, 2015....
Tacoma, UNITED STATES
Chinese First Lady Peng Liyuan visits Lincoln High School in Tacoma, Washington
Chinese First Lady Peng Liyuan visits Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder
USA-CHINA/
RTX1S5HX
September 24, 2015
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington,...
Tacoma, UNITED STATES
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington...
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder
USA-CHINA/
RTX1S5HU
September 24, 2015
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington,...
Tacoma, UNITED STATES
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington...
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder TPX IMAGES OF THE DAY
USA-CHINA/
RTX1S5HT
September 24, 2015
A police officer moves back Vietnamese protesters in advance of Chinese President Xi Jinping's visit...
Tacoma, UNITED STATES
A police officer moves back Vietnamese protesters in advance of Chinese President Xi Jinping's visit...
A police officer moves back Vietnamese protesters in advance of Chinese President Xi Jinping's visit to Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder
USA-SECURITY/
RTX1L9TJ
July 21, 2015
MSgt Steven Bennett (L), NCOIC of the Boundary Workshop and SSgt Michael James talk the 561st Network...
Colorado Springs, UNITED STATES
MSgt Steven Bennett, NCOIC of the Boundary Workshop and SSgt Michael James talk the 561st Network Operations...
MSgt Steven Bennett (L), NCOIC of the Boundary Workshop and SSgt Michael James talk the 561st Network Operations Squadron (NOS), at Petersen Air Force Base in Colorado Springs, Colorado July 20, 2015. The 561st NOS executes defensive cyber operations in response to U.S. Cyber Command orders and intelligence based threats. REUTERS/Rick Wilking
USA-SECURITY/
RTX1L45I
July 20, 2015
A U.S. Air Force airman works at the 561st Network Operations Squadron (NOS) under the data wall with...
Colorado Springs, UNITED STATES
A U.S. Air Force airman works at the 561st Network Operations Squadron (NOS) under the data wall with...
A U.S. Air Force airman works at the 561st Network Operations Squadron (NOS) under the data wall with screens blanked during a reporter's visit at Petersen Air Force Base in Colorado Springs, Colorado July 20, 2015. The 561st NOS executes defensive cyber operations in response to U.S. Cyber Command orders and intelligence based threats. REUTERS/Rick Wilking TPX IMAGES OF THE DAY
SOUTHKOREA-USA/NORTHKOREA
RTR4WRS4
April 10, 2015
US Secretary of Defence Ashton Carter (4th L) and his South Korean counterpart Han Min-Koo (5th L) pay...
PYEONGTAEK, South Korea
US Secretary of Defence Carter and his South Korean counterpart Han pay a silent tribute for victims...
US Secretary of Defence Ashton Carter (4th L) and his South Korean counterpart Han Min-Koo (5th L) pay a silent tribute for victims of the South Korean naval vessel Cheonan (R), which was sunk on March 26, 2010 near the maritime border with North Korea, at a naval base in Pyeongtaek, 70 kms south of Seoul, on April 10, 2015. Defence Secretary Ashton Carter promised that the US would deploy state of the art weaponry in Asia, including the latest stealth bombers and cyber warfare units, to counter threats posed by the likes of North Korea. AFP PHOTO / POOL / JUNG YEON-JE
SOUTHKOREA-USA/NORTHKOREA
RTR4WRRR
April 10, 2015
US Secretary of Defence Ashton Carter (R) and his South Korean counterpart Han Min-Koo (L) look at the...
PYEONGTAEK, South Korea
US Secretary of Defence Carter and his South Korean counterpart Han look at the wreckage of the South...
US Secretary of Defence Ashton Carter (R) and his South Korean counterpart Han Min-Koo (L) look at the wreckage of the South Korean naval vessel Cheonan, which was sunk on March 26, 2010 near the maritime border with North Korea, at a naval base in Pyeongtaek, 70 kms south of Seoul, on April 10, 2015. Defence Secretary Ashton Carter promised that the US would deploy state of the art weaponry in Asia, including the latest stealth bombers and cyber warfare units, to counter threats posed by the likes of North Korea. REUTERS/Jung Yeon-Je/Pool
SOUTHKOREA-USA/NORTHKOREA
RTR4WRRL
April 10, 2015
US Secretary of Defence Ashton Carter (C) and his South Korean counterpart Han Min-Koo (L) look at the...
PYEONGTAEK, South Korea
US Secretary of Defence Carter and his South Korean counterpart Han look at the wreckage of the South...
US Secretary of Defence Ashton Carter (C) and his South Korean counterpart Han Min-Koo (L) look at the wreckage of the South Korean naval vessel Cheonan, which was sunk on March 26, 2010 near the maritime border with North Korea, at a naval base in Pyeongtaek, 70 kms south of Seoul, on April 10, 2015. Defence Secretary Ashton Carter promised that the US would deploy state of the art weaponry in Asia, including the latest stealth bombers and cyber warfare units, to counter threats posed by the likes of North Korea. REUTERS/Jung Yeon-Je/Pool
SOUTHKOREA-USA/NORTHKOREA
RTR4WRQV
April 10, 2015
US Secretary of Defence Ashton Carter reacts as he looks around the wreckage of the South Korean naval...
PYEONGTAEK, REPUBLIC OF KOREA
US Secretary of Defence Ashton Carter reacts as he looks around the wreckage of the South Korean naval...
US Secretary of Defence Ashton Carter reacts as he looks around the wreckage of the South Korean naval vessel Cheonan, which was sunk on March 26, 2010 near the maritime border with North Korea, at a naval base in Pyeongtaek, 70 kms south of Seoul, on April 10, 2015. Defence Secretary Ashton Carter promised that the US would deploy state of the art weaponry in Asia, including the latest stealth bombers and cyber warfare units, to counter threats posed by the likes of North Korea. REUTERS/Jung Yeon-Je/Pool
USA-OBAMA/
RTR4LBN0
January 13, 2015
Department of Homeland Security workers at the National Cybersecurity and Communications Integration...
Arlington, UNITED STATES
Department of Homeland Security workers at the National Cybersecurity and Communications Integration...
Department of Homeland Security workers at the National Cybersecurity and Communications Integration Center in Arlington, Virginia, January 13, 2015. REUTERS/Larry Downing (UNITED STATES - Tags: POLITICS SCIENCE TECHNOLOGY CRIME LAW MILITARY)
USA-OBAMA/
RTR4LBMO
January 13, 2015
A Department of Homeland Security worker listens to U.S. President Barack Obama talk at the National...
Arlington, UNITED STATES
A Department of Homeland Security worker listen to U.S. President Barack Obama talk at the National Cybersecurity...
A Department of Homeland Security worker listens to U.S. President Barack Obama talk at the National Cybersecurity and Communications Integration Center in Arlington, Virginia, January 13, 2015. REUTERS/Larry Downing (UNITED STATES - Tags: POLITICS SCIENCE TECHNOLOGY CRIME LAW MILITARY)
HACKING-TOOL/
RTR4JEYR
December 28, 2014
People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration...
Zenica, Bosnia and Herzegovina
People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration...
People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration taken in Zenica December 27, 2014. A previously undisclosed hacking campaign against military targets in Israel and Europe is probably backed by a country that misused security-testing software to cover its tracks and enhance its capability, researchers said. Picture taken December 27, 2014. REUTERS/Dado Ruvic (BOSNIA AND HERZEGOVINA - Tags: SCIENCE TECHNOLOGY CRIME LAW)
CYBERSECURITY-HACKING/
RTR41HX3
August 06, 2014
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker...
Las Vegas, UNITED STATES
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker...
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS)
CYBERSECURITY-HACKERS/
RTR41DIB
August 06, 2014
Tani Currin, marketing events manager for computer security software and hardware developer Sophos, holds...
Las Vegas, UNITED STATES
Currin, marketing events manager for Sophos, holds an "anti-selfie" mask during the Black Hat USA 2014...
Tani Currin, marketing events manager for computer security software and hardware developer Sophos, holds an "anti-selfie" mask during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 5, 2014. The mask is part of a privacy awareness marketing campaign, she said. Sophos is a developer of computer security software and hardware. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY BUSINESS SOCIETY)
JAPAN-CYBER-DEFENCE/
RTR3FFDG
September 30, 2013
Participants from government ministries and agencies take part in the Cyber Defense Exercise with Recurrence...
Tokyo, Japan
Participants from government ministries and agencies take part in the CYDER in Tokyo
Participants from government ministries and agencies take part in the Cyber Defense Exercise with Recurrence (CYDER) in Tokyo September 25, 2013. Civil servants from across Japan recently gathered at Japan's Interior Ministry for the first time to train to defend themselves against a cyber assault. Japan has no central agency tasked with defending the nation in cyberspace, and technicians from Japan's key ministries have been brought in to test their skills. Officials say the threat from hackers is rising, and upping Japan's game is increasingly urgent. Picture taken September 25, 2013. REUTERS/Toru Hanai (JAPAN - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY)
GERMANY
RTX121E4
July 27, 2013
A protester holds a poster depicting German Chancellor Angela Merkel as he attends a demonstration against...
Berlin, Germany
A protester holds a poster depicting German Chancellor Merkel as he attends a demonstration against secret...
A protester holds a poster depicting German Chancellor Angela Merkel as he attends a demonstration against secret monitoring programmes PRISM, TEMPORA, INDECT and showing solidarity with whistleblowers Edward Snowden, Bradley Manning and others in front of Berlin's Brandenburg gate July 27, 2013. REUTERS/Pawel Kopczynski (GERMANY - Tags: CRIME LAW POLITICS CIVIL UNREST)
USA-SECURITY-SNOWDEN-LIES
RTX10R38
June 17, 2013
A live chat of Edward Snowden, former contractor at the National Security Agency (NSA), is monitored...
Hong Kong, China
A live chat of Edward Snowden is monitored by Tom Grundy on a screen at his home in Hong Kong
A live chat of Edward Snowden, former contractor at the National Security Agency (NSA), is monitored by Tom Grundy, co-organizer of a rally that was held on Saturday supporting Snowden, on a screen at his home in Hong Kong June 17, 2013. Snowden, the American who leaked details about U.S. National Security Agency surveillance programs, said on Monday he decided to disclose the information after observing "a continuing litany of lies" from senior officials to Congress. REUTERS/Bobby Yip (CHINA - Tags: POLITICS CRIME LAW SCIENCE TECHNOLOGY)
USA-SECURITY-CHINA-SNOWDEN/
RTX10LY6
June 13, 2013
Protesters supporting Edward Snowden, a contractor at the National Security Agency (NSA), hold a photo...
Hong Kong, China
Protesters supporting Snowden hold a photo of him during a demonstration outside the U.S. Consulate in...
Protesters supporting Edward Snowden, a contractor at the National Security Agency (NSA), hold a photo of Snowden during a demonstration outside the U.S. Consulate in Hong Kong June 13, 2013. China's Foreign Ministry offered no details on Thursday on Snowden, the National Security Agency contractor who revealed the U.S. government's top-secret monitoring of phone and Internet data and who is in hiding in Hong Kong. REUTERS/Bobby Yip (CHINA - Tags: POLITICS SCIENCE TECHNOLOGY CIVIL UNREST TPX IMAGES OF THE DAY)
USA-CYBERSECURITY/
RTX10LF4
June 12, 2013
General Keith Alexander, commander of the U.S. Cyber Command, director of the National Security Agency...
Washington, UNITED STATES
General Keith Alexander arrives at a Senate Appropriations Committee hearing in Washington
General Keith Alexander, commander of the U.S. Cyber Command, director of the National Security Agency (NSA) and chief of the Central Security Service (CSS), arrives at the Senate Appropriations Committee hearing on Cybersecurity: Preparing for and Responding to the Enduring Threat, on Capitol Hill in Washington June 12, 2013. REUTERS/Yuri Gripas (UNITED STATES - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY TPX IMAGES OF THE DAY)
USA DEFENSE/CYBER
RTXZNDW
May 15, 2013
U.S. Navy Rear Admiral William Leigher (C), director of Warfare Integration for Information Dominance,...
Washington, UNITED STATES
U.S. Navy Rear Admiral Leigher, director of Warfare Integration for Information Dominance, speaks at...
U.S. Navy Rear Admiral William Leigher (C), director of Warfare Integration for Information Dominance, speaks at the Reuters Cyber Summit in Washington May 15, 2013. REUTERS/Yuri Gripas (UNITED STATES - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY BUSINESS)
USA DEFENSE/CYBER
RTXZNDU
May 15, 2013
U.S. Navy Rear Admiral William Leigher, director of Warfare Integration for Information Dominance, reacts...
Washington, UNITED STATES
U.S. Navy Rear Admiral Leigher, director of Warfare Integration for Information Dominance, reacts at...
U.S. Navy Rear Admiral William Leigher, director of Warfare Integration for Information Dominance, reacts at the Reuters Cyber Summit in Washington May 15, 2013. REUTERS/Yuri Gripas (UNITED STATES - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY BUSINESS)
USA DEFENSE/CYBER
RTXZNDN
May 15, 2013
U.S. Navy Rear Admiral William Leigher, director of Warfare Integration for Information Dominance; speaks...
Washington, UNITED STATES
U.S. Navy Rear Admiral Leigher, director of Warfare Integration for Information Dominance; speaks at...
U.S. Navy Rear Admiral William Leigher, director of Warfare Integration for Information Dominance; speaks at the Reuters Cyber Summit in Washington May 15, 2013. REUTERS/Yuri Gripas (UNITED - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY BUSINESS)
USA DEFENSE/CYBER
RTXZNDL
May 15, 2013
U.S. Navy Rear Admiral William Leigher, director of Warfare Integration for Information Dominance, speaks...
Washington, UNITED STATES
U.S. Navy Rear Admiral Leigher, director of Warfare Integration for Information Dominance, speaks at...
U.S. Navy Rear Admiral William Leigher, director of Warfare Integration for Information Dominance, speaks at the Reuters Cyber Summit in Washington May 15, 2013. REUTERS/Yuri Gripas (UNITED STATES - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY BUSINESS)
INTERNET-ATTACK/
RTXXZVX
March 27, 2013
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. One...
Warsaw, Poland
Illustration file picture shows a man typing on a computer keyboard in Warsaw
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. One of the largest ever cyber attacks is slowing global internet services after an organisation blocking "spam" content became a target, with some experts saying the disruption could get worse. To match INTERNET-ATTACK/ REUTERS/Kacper Pempel/Files (POLAND - Tags: BUSINESS SCIENCE TECHNOLOGY)
CYBERSECURITY/IRAN
RTR2UQCC
December 02, 2011
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences...
Charlotte, UNITED STATES
To match Insight - CYBERSECURITY/IRAN
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, works on his laptop computer during a portrait session in Charlotte, North Carolina December 1, 2011. A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious worm that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet, according to research Bumgarner, a retired U.S. Army special-operations veteran and former intelligence officer. To match Insight - CYBERSECURITY/IRAN REUTERS/John Adkisson (UNITED STATES - Tags: SCIENCE TECHNOLOGY MILITARY)
CYBERSECURITY/IRAN
RTR2UQCA
December 02, 2011
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences...
Charlotte, UNITED STATES
To match Insight - CYBERSECURITY/IRAN
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, holds a notebook computer while posing for a portrait in Charlotte December 1, 2011. A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious worm that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet, according to research Bumgarner, a retired U.S. Army special-operations veteran and former intelligence officer. To match Insight - CYBERSECURITY/IRAN REUTERS/John Adkisson (UNITED STATES - Tags: SCIENCE TECHNOLOGY MILITARY)
CYBERSECURITY/IRAN
RTR2UQC9
December 02, 2011
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences...
Charlotte, UNITED STATES
To match Insight - CYBERSECURITY/IRAN
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, poses for a portrait in Charlotte, North Carolina December 1, 2011. A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious worm that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet, according to research Bumgarner, a retired U.S. Army special-operations veteran and former intelligence officer. To match Insight - CYBERSECURITY/IRAN REUTERS/John Adkisson (UNITED STATES - Tags: SCIENCE TECHNOLOGY MILITARY)
CYBERSECURITY/IRAN
RTR2UQC8
December 02, 2011
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences...
Charlotte, UNITED STATES
To match Insight - CYBERSECURITY/IRAN
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, poses for a portrait in Charlotte, North Carolina December 1, 2011. A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious worm that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet, according to research Bumgarner, a retired U.S. Army special-operations veteran and former intelligence officer. To match Insight - CYBERSECURITY/IRAN REUTERS/John Adkisson (UNITED STATES - Tags: SCIENCE TECHNOLOGY MILITARY)
CYBERSECURITY/IRAN
RTR2UQC7
December 02, 2011
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences...
Charlotte, UNITED STATES
To match Insight - CYBERSECURITY/IRAN
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, poses for a portrait in Charlotte, North Carolina December 1, 2011. A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious worm that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet, according to research Bumgarner, a retired U.S. Army special-operations veteran and former intelligence officer. To match Insight - CYBERSECURITY/IRAN REUTERS/John Adkisson (UNITED STATES - Tags: SCIENCE TECHNOLOGY MILITARY)
CYBERSECURITY/IRAN
RTR2UQC6
December 02, 2011
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences...
Charlotte, UNITED STATES
To match Insight - CYBERSECURITY/IRAN
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, poses for a portrait in Charlotte, North Carolina December 1, 2011. A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious worm that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet, according to research Bumgarner, a retired U.S. Army special-operations veteran and former intelligence officer. To match Insight - CYBERSECURITY/IRAN REUTERS/John Adkisson (UNITED STATES - Tags: SCIENCE TECHNOLOGY MILITARY)
Technology
Technology
Top Secret Cyber Security Center - 07 Oct 2011
15 PICTURES
USA/
RTR2S0PH
September 28, 2011
A sign lists prohibited items on a door leading to a watch and warning center of a cyber security defense...
Idaho Falls, UNITED STATES
A sign lists prohibited items on a door leading to a watch and warning center of a cyber security defense...
A sign lists prohibited items on a door leading to a watch and warning center of a cyber security defense lab at the Idaho National Laboratory in Idaho Falls, Idaho September 29, 2011. REUTERS/Jim Urquhart (UNITED STATES - Tags: CRIME LAW MILITARY POLITICS SCIENCE TECHNOLOGY)
USA-CYBERSECURITY/
RTR2NQSR
June 16, 2011
A journalist checks the U.S. Senate's website after it was attacked by internet hackers in Washington...
Washington, UNITED STATES
To match Special Report USA-CYBERSECURITY/
A journalist checks the U.S. Senate's website after it was attacked by internet hackers in Washington June 13, 2011. The U.S. Senate's website was hacked over the weekend, leading to a review of all of its websites, in the latest embarrassing breach of security to hit a major U.S. Government institution. The Pentagon is about to roll out an expanded effort to safeguard its contractors from hackers and is building a virtual firing range in cyberspace to test new technologies, according to officials familiar with the plans, as a recent wave of cyber attacks boosts concerns about U.S. vulnerability to digital warfare. The twin efforts show how President Barack Obama's administration is racing on multiple fronts to plug the holes in U.S. cyber defenses. To match Special Report USA-CYBERSECURITY/ REUTERS/Stelios Varias (UNITED STATES - Tags: CRIME LAW POLITICS MILITARY SCI TECH)
USA-CYBERWAR/
RTXT2ZC
October 05, 2010
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center...
Colorado Springs, UNITED STATES
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center...
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2Z7
October 05, 2010
TSgt James Ortiz, shift lead, boundary protection looks over a rack in the server room at the Air Force...
Colorado Springs, UNITED STATES
TSgt James Ortiz looks over a rack in the server room at the Air Force Space Command Network Operations...
TSgt James Ortiz, shift lead, boundary protection looks over a rack in the server room at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2WG
October 05, 2010
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center...
Colorado Springs, UNITED STATES
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center...
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2VH
October 05, 2010
A map is displayed on one of the screens at the Air Force Space Command Network Operations & Security...
Colorado Springs, UNITED STATES
A map is displayed on one of the screens at the Air Force Space Command Network Operations & Security...
A map is displayed on one of the screens at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2UX
October 05, 2010
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center...
Colorado Springs, UNITED STATES
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center...
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH CIVIL UNREST)
USA-CYBERWAR/
RTXT2UT
October 05, 2010
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force...
Colorado Springs, UNITED STATES
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force...
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2UR
October 05, 2010
MSgt Michael Gregory, senior operations controller, works at the Air Force Space Command Network Operations...
Colorado Springs, UNITED STATES
MSgt Michael Gregory, works at the Air Force Space Command Network Operations & Security Center at Peterson...
MSgt Michael Gregory, senior operations controller, works at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH CIVIL UNREST)
USA-CYBERWAR/
RTXT2UN
October 05, 2010
Rear Admiral Mike Brown, deputy assistant secretary for Cyber Security and Communications, briefs the...
Arlington, UNITED STATES
Rear Admiral Mike Brown, deputy assistant secretary for Cyber Security and Communications, briefs the...
Rear Admiral Mike Brown, deputy assistant secretary for Cyber Security and Communications, briefs the media on Cyber Storm III exercise at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia on September 24, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Hyungwon Kang (UNITED STATES - Tags: CRIME LAW SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2SX
October 05, 2010
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration...
Arlington, UNITED STATES
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration...
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia on September 24, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Hyungwon Kang (UNITED STATES - Tags: CRIME LAW SCI TECH POLITICS)
Sort by
Display
Items per page
Page
of 2