Ajax loader

Can't find what you're looking for?

 

Be sure to Sign in to see all available content.

 

If you don't have an account, Register here.

Search results for: Cyber-warfare

UKRAINE-CRISIS/CYBER-WAR
RTS6VKRN 
April 06, 2022 
Ukrainian IT manager Andrew works at his computer after an interview with Reuters, amid the ongoing Russian... 
Odesa, Ukraine 
Ukraine's keyboard warriors offer alternate way to fight Russian invasion 
Ukrainian IT manager Andrew works at his computer after an interview with Reuters, amid the ongoing Russian invasion of Ukraine, in Odesa, Ukraine April 6, 2022. Picture taken April 6, 2022. REUTERS/Ueslei Marcelino 
UKRAINE-CRISIS/CYBER-WAR
RTS6VKPO 
April 06, 2022 
Ukrainian IT manager Andrew poses for a photo after an interview with Reuters, amid the ongoing Russian... 
Odesa, Ukraine 
Ukraine's keyboard warriors offer alternate way to fight Russian invasion 
Ukrainian IT manager Andrew poses for a photo after an interview with Reuters, amid the ongoing Russian invasion of Ukraine, in Odesa, Ukraine April 6, 2022. Picture taken April 6, 2022. REUTERS/Ueslei Marcelino 
UKRAINE-CRISIS/CYBER-WAR
RTS6VKPN 
April 06, 2022 
Ukrainian IT manager Andrew poses for a photo after an interview with Reuters, amid the ongoing Russian... 
Odesa, Ukraine 
Ukraine's keyboard warriors offer alternate way to fight Russian invasion 
Ukrainian IT manager Andrew poses for a photo after an interview with Reuters, amid the ongoing Russian invasion of Ukraine, in Odesa, Ukraine April 6, 2022. Picture taken April 6, 2022. REUTERS/Ueslei Marcelino 
UKRAINE-CRISIS/CYBER-WAR
RTS6VKNZ 
April 06, 2022 
Ukrainian IT manager Andrew works at his computer after an interview with Reuters, amid the ongoing Russian... 
Odesa, Ukraine 
Ukraine's keyboard warriors offer alternate way to fight Russian invasion 
Ukrainian IT manager Andrew works at his computer after an interview with Reuters, amid the ongoing Russian invasion of Ukraine, in Odesa, Ukraine April 6, 2022. Picture taken April 6, 2022. REUTERS/Ueslei Marcelino 
UKRAINE-CRISIS/CYBER-WAR
RTS6VKO1 
April 06, 2022 
Ukrainian IT manager Andrew works at his computer after an interview with Reuters, amid the ongoing Russian... 
Odesa, Ukraine 
Ukraine's keyboard warriors offer alternate way to fight Russian invasion 
Ukrainian IT manager Andrew works at his computer after an interview with Reuters, amid the ongoing Russian invasion of Ukraine, in Odesa, Ukraine April 6, 2022. Picture taken April 6, 2022. REUTERS/Ueslei Marcelino 
UKRAINE-CRISIS/CYBER-WAR
RTS6VKDV 
April 06, 2022 
Ukrainian IT manager Andrew works at his computer after an interview to Reuters, amid the ongoing Russian... 
Odesa, Ukraine 
Ukraine's keyboard warriors offer alternate way to fight Russian invasion 
Ukrainian IT manager Andrew works at his computer after an interview to Reuters, amid the ongoing Russian invasion of Ukraine, in Odesa, Ukraine April 6, 2022. Picture taken April 6, 2022. REUTERS/Ueslei Marcelino 
UKRAINE-CRISIS/CYBER-WAR
RTS6VKDR 
April 06, 2022 
Ukrainian IT manager Andrew works at his computer after an interview to Reuters, amid the ongoing Russian... 
Odesa, Ukraine 
Ukraine's keyboard warriors offer alternate way to fight Russian invasion 
Ukrainian IT manager Andrew works at his computer after an interview to Reuters, amid the ongoing Russian invasion of Ukraine, in Odesa, Ukraine April 6, 2022. Picture taken April 6, 2022. REUTERS/Ueslei Marcelino 
UKRAINE-CRISIS/CYBER-WAR
RTS6VK0M 
April 06, 2022 
Ukrainian IT manager Andrew works at his computer after an interview with Reuters, amid the ongoing Russian... 
Odesa, Ukraine 
Ukraine's keyboard warriors offer alternate way to fight Russian invasion 
Ukrainian IT manager Andrew works at his computer after an interview with Reuters, amid the ongoing Russian invasion of Ukraine, in Odesa, Ukraine April 6, 2022. Picture taken April 6, 2022. REUTERS/Ueslei Marcelino 
UKRAINE-CRISIS/
RTS652BL 
March 08, 2022 
Broken Ethernet cable is seen in front of binary code and words "cyber security" in this illustration... 
Zenica, Bosnia and Herzegovina 
Illustration shows broken Ethernet cable, binary code and words "cyber security\ 
Broken Ethernet cable is seen in front of binary code and words "cyber security" in this illustration taken March 8, 2022. REUTERS/Dado Ruvic/Illustration 
UKRAINE-CRISIS/
RTS652BR 
March 08, 2022 
Broken Ethernet cable is seen in front of binary code and words "cyber attack" in this illustration taken... 
Zenica, Bosnia and Herzegovina 
Illustration shows broken Ethernet cable, binary code and words "cyber attack\ 
Broken Ethernet cable is seen in front of binary code and words "cyber attack" in this illustration taken March 8, 2022. REUTERS/Dado Ruvic/Illustration 
ISRAEL-HACKERS/
RTS2NE0J 
August 22, 2019 
A man is reflected in a monitor as he takes part in a training session at Cybergym, a cyber-warfare training... 
Hadera, Israel 
A man is reflected in a monitor as he takes part in a training session at Cybergym, a cyber-warfare training... 
A man is reflected in a monitor as he takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. Picture taken July 8, 2019. REUTERS/Ronen Zvulun 
ISRAEL-HACKERS/
RTS2NDQG 
August 22, 2019 
Graffiti is seen near the logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric... 
Hadera, Israel 
Graffiti is seen near the logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric... 
Graffiti is seen near the logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun 
ISRAEL-HACKERS/
RTS2NDP4 
August 22, 2019 
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel... 
Hadera, Israel 
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel... 
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun 
ISRAEL-HACKERS/
RTS2NDP2 
August 22, 2019 
People take part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel... 
Hadera, Israel 
People take part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel... 
People take part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun 
ISRAEL-HACKERS/
RTS2NDP1 
August 22, 2019 
Ofir Hason, CEO of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation,... 
Hadera, Israel 
Ofir Hason, CEO of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation,... 
Ofir Hason, CEO of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, looks on during an interview with Reuters at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun 
ISRAEL-HACKERS/
RTS2NDOW 
August 22, 2019 
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel... 
Hadera, Israel 
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel... 
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun 
ISRAEL-HACKERS/
RTS2NDOV 
August 22, 2019 
The logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, is... 
Hadera, Israel 
The logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, is... 
The logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, is seen at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun 
ISRAEL-HACKERS/
RTS2NDOU 
August 22, 2019 
The logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, is... 
Hadera, Israel 
The logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, is... 
The logo of Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, is seen at their training center in Hadera, Israel July 8, 2019. Picture taken July 8, 2019. REUTERS/Ronen Zvulun 
ISRAEL-HACKERS/
RTS2NDOS 
August 22, 2019 
A man is reflected in a monitor as he takes part in a training session at Cybergym, a cyber-warfare training... 
Hadera, Israel 
A man is reflected in a monitor as he takes part in a training session at Cybergym, a cyber-warfare training... 
A man is reflected in a monitor as he takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun 
ISRAEL-HACKERS/
RTS2NDOQ 
August 22, 2019 
A Guy Fawkes mask made popular by the movie "V for Vendetta", hangs on a wall in an office at Cybergym,... 
Hadera, Israel 
A Guy Fawkes mask made popular by the movie "V for Vendetta", hangs on a wall in an office at Cybergym,... 
A Guy Fawkes mask made popular by the movie "V for Vendetta", hangs on a wall in an office at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun 
ISRAEL-HACKERS/
RTS2NDOP 
August 22, 2019 
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel... 
Hadera, Israel 
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel... 
A man takes part in a training session at Cybergym, a cyber-warfare training facility backed by the Israel Electric Corporation, at their training center in Hadera, Israel July 8, 2019. REUTERS/Ronen Zvulun 
CYBER-ATTACK/BRITAIN
RTX35W56 
May 15, 2017 
Cables and computers are seen inside a data centre at an office in the heart of the financial district... 
London, United Kingdom 
Cables and computers are seen inside a data centre at an office in the heart of the financial district... 
Cables and computers are seen inside a data centre at an office in the heart of the financial district in London, Britain May 15, 2017. REUTERS/Dylan Martinez 
CYBER-ATTACK/BRITAIN
RTX35W55 
May 15, 2017 
Cables and computers are seen inside a data centre at an office in the heart of the financial district... 
London, United Kingdom 
Cables and computers are seen inside a data centre at an office in the heart of the financial district... 
Cables and computers are seen inside a data centre at an office in the heart of the financial district in London, Britain May 15, 2017. REUTERS/Dylan Martinez 
USA-CHINA/
RTX1S5Q4 
September 24, 2015 
Chinese President Xi Jinping receives a football jersey bearing his name as he visits football players... 
Tacoma, UNITED STATES 
Chinese President Xi Jinping receives a football jersey bearing his name as he visits football players... 
Chinese President Xi Jinping receives a football jersey bearing his name as he visits football players at Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder 
USA-CHINA/
RTX1S5Q2 
September 24, 2015 
Chinese President Xi Jinping receives a football jersey bearing his name as he visits football players... 
Tacoma, UNITED STATES 
Chinese President Xi Jinping receives a football jersey bearing his name as he visits football players... 
Chinese President Xi Jinping receives a football jersey bearing his name as he visits football players at Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder 
USA-CHINA/
RTX1S5OI 
September 24, 2015 
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington,... 
Tacoma, UNITED STATES 
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington... 
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder 
USA-CHINA/
RTX1S5IP 
September 24, 2015 
Chinese First Lady Peng Liyuan visits Lincoln High School in Tacoma, Washington, September 23, 2015.... 
Tacoma, UNITED STATES 
Chinese First Lady Peng Liyuan visits Lincoln High School in Tacoma, Washington 
Chinese First Lady Peng Liyuan visits Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder 
USA-CHINA/
RTX1S5I4 
September 24, 2015 
Chinese First Lady Peng Liyuan visits Lincoln High School in Tacoma, Washington, September 23, 2015.... 
Tacoma, UNITED STATES 
Chinese First Lady Peng Liyuan visits Lincoln High School in Tacoma, Washington 
Chinese First Lady Peng Liyuan visits Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder 
USA-CHINA/
RTX1S5HX 
September 24, 2015 
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington,... 
Tacoma, UNITED STATES 
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington... 
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder 
USA-CHINA/
RTX1S5HU 
September 24, 2015 
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington,... 
Tacoma, UNITED STATES 
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington... 
Chinese President Xi Jinping visits with football players at Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder TPX IMAGES OF THE DAY
USA-CHINA/
RTX1S5HT 
September 24, 2015 
A police officer moves back Vietnamese protesters in advance of Chinese President Xi Jinping's visit... 
Tacoma, UNITED STATES 
A police officer moves back Vietnamese protesters in advance of Chinese President Xi Jinping's visit... 
A police officer moves back Vietnamese protesters in advance of Chinese President Xi Jinping's visit to Lincoln High School in Tacoma, Washington, September 23, 2015. Seeking to warm bilateral ties and project a sunny climate for U.S. business, Chinese President Xi Jinping vowed on Wednesday to cut restrictions on foreign investment, while his chief Internet regulator appeared to lay the groundwork for a basic agreement later this week on cyber warfare. Xi's busy stop on the West Coast is the first leg of a week-long trip to the United States and offers him a chance to highlight China's cooperation with U.S. companies before he heads to Washington. REUTERS/David Ryder 
USA-SECURITY/
RTX1L9TJ 
July 21, 2015 
MSgt Steven Bennett (L), NCOIC of the Boundary Workshop and SSgt Michael James talk the 561st Network... 
Colorado Springs, UNITED STATES 
MSgt Steven Bennett, NCOIC of the Boundary Workshop and SSgt Michael James talk the 561st Network Operations... 
MSgt Steven Bennett (L), NCOIC of the Boundary Workshop and SSgt Michael James talk the 561st Network Operations Squadron (NOS), at Petersen Air Force Base in Colorado Springs, Colorado July 20, 2015. The 561st NOS executes defensive cyber operations in response to U.S. Cyber Command orders and intelligence based threats. REUTERS/Rick Wilking
USA-SECURITY/
RTX1L45I 
July 20, 2015 
A U.S. Air Force airman works at the 561st Network Operations Squadron (NOS) under the data wall with... 
Colorado Springs, UNITED STATES 
A U.S. Air Force airman works at the 561st Network Operations Squadron (NOS) under the data wall with... 
A U.S. Air Force airman works at the 561st Network Operations Squadron (NOS) under the data wall with screens blanked during a reporter's visit at Petersen Air Force Base in Colorado Springs, Colorado July 20, 2015. The 561st NOS executes defensive cyber operations in response to U.S. Cyber Command orders and intelligence based threats. REUTERS/Rick Wilking TPX IMAGES OF THE DAY
SOUTHKOREA-USA/NORTHKOREA
RTR4WRS4 
April 10, 2015 
US Secretary of Defence Ashton Carter (4th L) and his South Korean counterpart Han Min-Koo (5th L) pay... 
PYEONGTAEK, South Korea 
US Secretary of Defence Carter and his South Korean counterpart Han pay a silent tribute for victims... 
US Secretary of Defence Ashton Carter (4th L) and his South Korean counterpart Han Min-Koo (5th L) pay a silent tribute for victims of the South Korean naval vessel Cheonan (R), which was sunk on March 26, 2010 near the maritime border with North Korea, at a naval base in Pyeongtaek, 70 kms south of Seoul, on April 10, 2015. Defence Secretary Ashton Carter promised that the US would deploy state of the art weaponry in Asia, including the latest stealth bombers and cyber warfare units, to counter threats posed by the likes of North Korea. AFP PHOTO / POOL / JUNG YEON-JE 
SOUTHKOREA-USA/NORTHKOREA
RTR4WRRR 
April 10, 2015 
US Secretary of Defence Ashton Carter (R) and his South Korean counterpart Han Min-Koo (L) look at the... 
PYEONGTAEK, South Korea 
US Secretary of Defence Carter and his South Korean counterpart Han look at the wreckage of the South... 
US Secretary of Defence Ashton Carter (R) and his South Korean counterpart Han Min-Koo (L) look at the wreckage of the South Korean naval vessel Cheonan, which was sunk on March 26, 2010 near the maritime border with North Korea, at a naval base in Pyeongtaek, 70 kms south of Seoul, on April 10, 2015. Defence Secretary Ashton Carter promised that the US would deploy state of the art weaponry in Asia, including the latest stealth bombers and cyber warfare units, to counter threats posed by the likes of North Korea. REUTERS/Jung Yeon-Je/Pool 
SOUTHKOREA-USA/NORTHKOREA
RTR4WRRL 
April 10, 2015 
US Secretary of Defence Ashton Carter (C) and his South Korean counterpart Han Min-Koo (L) look at the... 
PYEONGTAEK, South Korea 
US Secretary of Defence Carter and his South Korean counterpart Han look at the wreckage of the South... 
US Secretary of Defence Ashton Carter (C) and his South Korean counterpart Han Min-Koo (L) look at the wreckage of the South Korean naval vessel Cheonan, which was sunk on March 26, 2010 near the maritime border with North Korea, at a naval base in Pyeongtaek, 70 kms south of Seoul, on April 10, 2015. Defence Secretary Ashton Carter promised that the US would deploy state of the art weaponry in Asia, including the latest stealth bombers and cyber warfare units, to counter threats posed by the likes of North Korea. REUTERS/Jung Yeon-Je/Pool 
SOUTHKOREA-USA/NORTHKOREA
RTR4WRQV 
April 10, 2015 
US Secretary of Defence Ashton Carter reacts as he looks around the wreckage of the South Korean naval... 
PYEONGTAEK, REPUBLIC OF KOREA 
US Secretary of Defence Ashton Carter reacts as he looks around the wreckage of the South Korean naval... 
US Secretary of Defence Ashton Carter reacts as he looks around the wreckage of the South Korean naval vessel Cheonan, which was sunk on March 26, 2010 near the maritime border with North Korea, at a naval base in Pyeongtaek, 70 kms south of Seoul, on April 10, 2015. Defence Secretary Ashton Carter promised that the US would deploy state of the art weaponry in Asia, including the latest stealth bombers and cyber warfare units, to counter threats posed by the likes of North Korea. REUTERS/Jung Yeon-Je/Pool
USA-OBAMA/
RTR4LBN0 
January 13, 2015 
Department of Homeland Security workers at the National Cybersecurity and Communications Integration... 
Arlington, UNITED STATES 
Department of Homeland Security workers at the National Cybersecurity and Communications Integration... 
Department of Homeland Security workers at the National Cybersecurity and Communications Integration Center in Arlington, Virginia, January 13, 2015. REUTERS/Larry Downing (UNITED STATES - Tags: POLITICS SCIENCE TECHNOLOGY CRIME LAW MILITARY) 
USA-OBAMA/
RTR4LBMO 
January 13, 2015 
A Department of Homeland Security worker listens to U.S. President Barack Obama talk at the National... 
Arlington, UNITED STATES 
A Department of Homeland Security worker listen to U.S. President Barack Obama talk at the National Cybersecurity... 
A Department of Homeland Security worker listens to U.S. President Barack Obama talk at the National Cybersecurity and Communications Integration Center in Arlington, Virginia, January 13, 2015. REUTERS/Larry Downing (UNITED STATES - Tags: POLITICS SCIENCE TECHNOLOGY CRIME LAW MILITARY) 
HACKING-TOOL/
RTR4JEYR 
December 28, 2014 
People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration... 
Zenica, Bosnia and Herzegovina 
People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration... 
People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration taken in Zenica December 27, 2014. A previously undisclosed hacking campaign against military targets in Israel and Europe is probably backed by a country that misused security-testing software to cover its tracks and enhance its capability, researchers said. Picture taken December 27, 2014. REUTERS/Dado Ruvic (BOSNIA AND HERZEGOVINA - Tags: SCIENCE TECHNOLOGY CRIME LAW) 
CYBERSECURITY-HACKING/
RTR41HX3 
August 06, 2014 
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker... 
Las Vegas, UNITED STATES 
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker... 
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS) 
CYBERSECURITY-HACKERS/
RTR41DIB 
August 06, 2014 
Tani Currin, marketing events manager for computer security software and hardware developer Sophos, holds... 
Las Vegas, UNITED STATES 
Currin, marketing events manager for Sophos, holds an "anti-selfie" mask during the Black Hat USA 2014... 
Tani Currin, marketing events manager for computer security software and hardware developer Sophos, holds an "anti-selfie" mask during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 5, 2014. The mask is part of a privacy awareness marketing campaign, she said. Sophos is a developer of computer security software and hardware. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY BUSINESS SOCIETY) 
JAPAN-CYBER-DEFENCE/
RTR3FFDG 
September 30, 2013 
Participants from government ministries and agencies take part in the Cyber Defense Exercise with Recurrence... 
Tokyo, Japan 
Participants from government ministries and agencies take part in the CYDER in Tokyo 
Participants from government ministries and agencies take part in the Cyber Defense Exercise with Recurrence (CYDER) in Tokyo September 25, 2013. Civil servants from across Japan recently gathered at Japan's Interior Ministry for the first time to train to defend themselves against a cyber assault. Japan has no central agency tasked with defending the nation in cyberspace, and technicians from Japan's key ministries have been brought in to test their skills. Officials say the threat from hackers is rising, and upping Japan's game is increasingly urgent. Picture taken September 25, 2013. REUTERS/Toru Hanai (JAPAN - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY) 
GERMANY
RTX121E4 
July 27, 2013 
A protester holds a poster depicting German Chancellor Angela Merkel as he attends a demonstration against... 
Berlin, Germany 
A protester holds a poster depicting German Chancellor Merkel as he attends a demonstration against secret... 
A protester holds a poster depicting German Chancellor Angela Merkel as he attends a demonstration against secret monitoring programmes PRISM, TEMPORA, INDECT and showing solidarity with whistleblowers Edward Snowden, Bradley Manning and others in front of Berlin's Brandenburg gate July 27, 2013. REUTERS/Pawel Kopczynski (GERMANY - Tags: CRIME LAW POLITICS CIVIL UNREST)
USA-SECURITY-SNOWDEN-LIES
RTX10R38 
June 17, 2013 
A live chat of Edward Snowden, former contractor at the National Security Agency (NSA), is monitored... 
Hong Kong, China 
A live chat of Edward Snowden is monitored by Tom Grundy on a screen at his home in Hong Kong 
A live chat of Edward Snowden, former contractor at the National Security Agency (NSA), is monitored by Tom Grundy, co-organizer of a rally that was held on Saturday supporting Snowden, on a screen at his home in Hong Kong June 17, 2013. Snowden, the American who leaked details about U.S. National Security Agency surveillance programs, said on Monday he decided to disclose the information after observing "a continuing litany of lies" from senior officials to Congress. REUTERS/Bobby Yip (CHINA - Tags: POLITICS CRIME LAW SCIENCE TECHNOLOGY) 
USA-SECURITY-CHINA-SNOWDEN/
RTX10LY6 
June 13, 2013 
Protesters supporting Edward Snowden, a contractor at the National Security Agency (NSA), hold a photo... 
Hong Kong, China 
Protesters supporting Snowden hold a photo of him during a demonstration outside the U.S. Consulate in... 
Protesters supporting Edward Snowden, a contractor at the National Security Agency (NSA), hold a photo of Snowden during a demonstration outside the U.S. Consulate in Hong Kong June 13, 2013. China's Foreign Ministry offered no details on Thursday on Snowden, the National Security Agency contractor who revealed the U.S. government's top-secret monitoring of phone and Internet data and who is in hiding in Hong Kong. REUTERS/Bobby Yip (CHINA - Tags: POLITICS SCIENCE TECHNOLOGY CIVIL UNREST TPX IMAGES OF THE DAY) 
USA-CYBERSECURITY/
RTX10LF4 
June 12, 2013 
General Keith Alexander, commander of the U.S. Cyber Command, director of the National Security Agency... 
Washington, UNITED STATES 
General Keith Alexander arrives at a Senate Appropriations Committee hearing in Washington 
General Keith Alexander, commander of the U.S. Cyber Command, director of the National Security Agency (NSA) and chief of the Central Security Service (CSS), arrives at the Senate Appropriations Committee hearing on Cybersecurity: Preparing for and Responding to the Enduring Threat, on Capitol Hill in Washington June 12, 2013. REUTERS/Yuri Gripas (UNITED STATES - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY TPX IMAGES OF THE DAY) 
USA DEFENSE/CYBER
RTXZNDW 
May 15, 2013 
U.S. Navy Rear Admiral William Leigher (C), director of Warfare Integration for Information Dominance,... 
Washington, UNITED STATES 
U.S. Navy Rear Admiral Leigher, director of Warfare Integration for Information Dominance, speaks at... 
U.S. Navy Rear Admiral William Leigher (C), director of Warfare Integration for Information Dominance, speaks at the Reuters Cyber Summit in Washington May 15, 2013. REUTERS/Yuri Gripas (UNITED STATES - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY BUSINESS) 
USA DEFENSE/CYBER
RTXZNDU 
May 15, 2013 
U.S. Navy Rear Admiral William Leigher, director of Warfare Integration for Information Dominance, reacts... 
Washington, UNITED STATES 
U.S. Navy Rear Admiral Leigher, director of Warfare Integration for Information Dominance, reacts at... 
U.S. Navy Rear Admiral William Leigher, director of Warfare Integration for Information Dominance, reacts at the Reuters Cyber Summit in Washington May 15, 2013. REUTERS/Yuri Gripas (UNITED STATES - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY BUSINESS) 
USA DEFENSE/CYBER
RTXZNDN 
May 15, 2013 
U.S. Navy Rear Admiral William Leigher, director of Warfare Integration for Information Dominance; speaks... 
Washington, UNITED STATES 
U.S. Navy Rear Admiral Leigher, director of Warfare Integration for Information Dominance; speaks at... 
U.S. Navy Rear Admiral William Leigher, director of Warfare Integration for Information Dominance; speaks at the Reuters Cyber Summit in Washington May 15, 2013. REUTERS/Yuri Gripas (UNITED - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY BUSINESS) 
USA DEFENSE/CYBER
RTXZNDL 
May 15, 2013 
U.S. Navy Rear Admiral William Leigher, director of Warfare Integration for Information Dominance, speaks... 
Washington, UNITED STATES 
U.S. Navy Rear Admiral Leigher, director of Warfare Integration for Information Dominance, speaks at... 
U.S. Navy Rear Admiral William Leigher, director of Warfare Integration for Information Dominance, speaks at the Reuters Cyber Summit in Washington May 15, 2013. REUTERS/Yuri Gripas (UNITED STATES - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY BUSINESS) 
INTERNET-ATTACK/
RTXXZVX 
March 27, 2013 
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. One... 
Warsaw, Poland 
Illustration file picture shows a man typing on a computer keyboard in Warsaw 
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. One of the largest ever cyber attacks is slowing global internet services after an organisation blocking "spam" content became a target, with some experts saying the disruption could get worse. To match INTERNET-ATTACK/ REUTERS/Kacper Pempel/Files (POLAND - Tags: BUSINESS SCIENCE TECHNOLOGY) 
KOREA-CYBER/
RTR3F995 
March 21, 2013 
An employee of the Korean Broadcasting System (KBS) passes identification systems at KBS' main building... 
Seoul, South Korea 
An employee of the KBS passes identification systems at KBS' main building in Seoul 
An employee of the Korean Broadcasting System (KBS) passes identification systems at KBS' main building in Seoul March 21, 2013. A hacking attack that brought down three South Korean broadcasters YTN, MBC and KBS as well as two major commercial banks, Shinhan Bank and NongHyup Bank has been identified by most commentators as Pyongyang flexing its muscles as military tensions on the divided peninsula sky-rocket. Officials in Seoul traced Wednesday's breach to a server in China, a country that has been used by North Korean hackers in the past. That reinforces the vulnerability of South Korea, the world's most wired economy, to unconventional warfare. REUTERS/Kim Hong-Ji (SOUTH KOREA - Tags: SCIENCE TECHNOLOGY CRIME LAW POLITICS BUSINESS MEDIA) 
KOREA-CYBER/
RTR3F993 
March 21, 2013 
An employee of the Korean Broadcasting System (KBS) transports computers on a trolley at KBS' main building... 
Seoul, South Korea 
An employee of the KBS transports computers on trolley at KBS' main building in Seoul 
An employee of the Korean Broadcasting System (KBS) transports computers on a trolley at KBS' main building in Seoul March 21, 2013. A hacking attack that brought down three South Korean broadcasters YTN, MBC and KBS as well as two major commercial banks, Shinhan Bank and NongHyup Bank has been identified by most commentators as Pyongyang flexing its muscles as military tensions on the divided peninsula sky-rocket. Officials in Seoul traced Wednesday's breach to a server in China, a country that has been used by North Korean hackers in the past. That reinforces the vulnerability of South Korea, the world's most wired economy, to unconventional warfare. REUTERS/Kim Hong-Ji (SOUTH KOREA - Tags: SCIENCE TECHNOLOGY CRIME LAW POLITICS BUSINESS MEDIA) 
KOREA-CYBER/
RTR3F98Y 
March 21, 2013 
Employees of the Korean Broadcasting System (KBS) pass by identification systems at its main building... 
Seoul, South Korea 
Employees of KBS pass by identification systems at its main building in Seoul 
Employees of the Korean Broadcasting System (KBS) pass by identification systems at its main building in Seoul March 21, 2013. A hacking attack that brought down three South Korean broadcasters YTN, MBC and KBS as well as two major commercial banks, Shinhan Bank and NongHyup Bank has been identified by most commentators as Pyongyang flexing its muscles as military tensions on the divided peninsula sky-rocket. Officials in Seoul traced Wednesday's breach to a server in China, a country that has been used by North Korean hackers in the past. That reinforces the vulnerability of South Korea, the world's most wired economy, to unconventional warfare. REUTERS/Kim Hong-Ji (SOUTH KOREA - Tags: SCIENCE TECHNOLOGY CRIME LAW POLITICS BUSINESS MEDIA) 
KOREA-CYBER/
RTR3F98U 
March 21, 2013 
A man walks past the main building of MBC television network in Seoul March 21, 2013.A hacking attack... 
Seoul, South Korea 
A man walks past main building of MBC television network in Seoul 
A man walks past the main building of MBC television network in Seoul March 21, 2013.A hacking attack that brought down three South Korean broadcasters YTN, MBC and KBS as well as two major commercial banks, Shinhan Bank and NongHyup Bank has been identified by most commentators as Pyongyang flexing its muscles as military tensions on the divided peninsula sky-rocket. Officials in Seoul traced Wednesday's breach to a server in China, a country that has been used by North Korean hackers in the past. That reinforces the vulnerability of South Korea, the world's most wired economy, to unconventional warfare. REUTERS/Kim Hong-Ji (SOUTH KOREA - Tags: SCIENCE TECHNOLOGY CRIME LAW POLITICS MEDIA BUSINESS) 
KOREA-CYBER/
RTR3F98N 
March 21, 2013 
A broadcasting vehicle of the MBC television network is parked as an employee walks by at the company's... 
Seoul, South Korea 
A broadcasting vehicle of the MBC television network is parked as an employee walks by at the company's... 
A broadcasting vehicle of the MBC television network is parked as an employee walks by at the company's compound in Seoul March 21, 2013. A hacking attack that brought down three South Korean broadcasters YTN, MBC and KBS as well as two major commercial banks, Shinhan Bank and NongHyup Bank has been identified by most commentators as Pyongyang flexing its muscles as military tensions on the divided peninsula sky-rocket. Officials in Seoul traced Wednesday's breach to a server in China, a country that has been used by North Korean hackers in the past. That reinforces the vulnerability of South Korea, the world's most wired economy, to unconventional warfare. REUTERS/Kim Hong-Ji (SOUTH KOREA - Tags: SCIENCE TECHNOLOGY CRIME LAW POLITICS MEDIA BUSINESS) 
KOREA-CYBERCRIME/
RTR2UW79 
December 06, 2011 
Police officers of the Cyber Terror Response Centre are reflected as they walk out of their office at... 
Seoul, South Korea 
To match feature KOREA-CYBERCRIME/ 
Police officers of the Cyber Terror Response Centre are reflected as they walk out of their office at the headquarters of the National Police Agency in Seoul December 5, 2011. South Korea, with its near-ubiquitous Internet access and lightning-fast broadband connections, was ranked by the United Nations Telecommunication Union recently as the world's most advanced nation in terms of information and communication technology usage. Unfortunately, the country also holds less laudable titles. Data from U.S.-based Internet security research firm Team Cymru indicates South Korea is, by far, Asia-Pacific's leading host of peer-to-peer "botnets," compromised, Internet-connected computers typically used for illegal activities and usually without the owner's knowledge. Picture taken on December 5, 2011. To match feature KOREA-CYBERCRIME/ REUTERS/Jo Yong-Hak (SOUTH KOREA - Tags: CRIME LAW SCIENCE TECHNOLOGY) 
CYBERSECURITY/IRAN
RTR2UQCC 
December 02, 2011 
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences... 
Charlotte, UNITED STATES 
To match Insight - CYBERSECURITY/IRAN 
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, works on his laptop computer during a portrait session in Charlotte, North Carolina December 1, 2011. A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious worm that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet, according to research Bumgarner, a retired U.S. Army special-operations veteran and former intelligence officer. To match Insight - CYBERSECURITY/IRAN REUTERS/John Adkisson (UNITED STATES - Tags: SCIENCE TECHNOLOGY MILITARY) 
CYBERSECURITY/IRAN
RTR2UQCA 
December 02, 2011 
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences... 
Charlotte, UNITED STATES 
To match Insight - CYBERSECURITY/IRAN 
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, holds a notebook computer while posing for a portrait in Charlotte December 1, 2011. A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious worm that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet, according to research Bumgarner, a retired U.S. Army special-operations veteran and former intelligence officer. To match Insight - CYBERSECURITY/IRAN REUTERS/John Adkisson (UNITED STATES - Tags: SCIENCE TECHNOLOGY MILITARY) 
Sort by 
Display 
Items per page 
Page 
of 2