Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy.

Can't find what you're looking for?

 

Be sure to Sign in to see all available content.

 

If you don't have an account, Register here.

Search results for: Cybercrime

VIETNAM-CYBERCRIME/
RTSECY2
May 15, 2016
A woman covers her face as she walks out the Vietnamese commercial Tien Phong bank in Hanoi May 13, 2016....
Hanoi, Vietnam
A woman covers her face as she walks out the Vietnamese commercial Tien Phong bank in Hanoi
A woman covers her face as she walks out the Vietnamese commercial Tien Phong bank in Hanoi May 13, 2016. REUTERS/Kham TPX IMAGES OF THE DAY
VIETNAM-CYBERCRIME/
RTSECY1
May 15, 2016
A man rides a motorcycle past the Vietnamese commercial Tien Phong bank in Hanoi May 13, 2016. REUTERS/Kham...
Hanoi, Vietnam
A man rides a motorcycle past the Vietnamese commercial Tien Phong bank in Hanoi
A man rides a motorcycle past the Vietnamese commercial Tien Phong bank in Hanoi May 13, 2016. REUTERS/Kham
ISRAEL-PALESTINIANS/CYBERCRIME
RTX29E9B
April 11, 2016
Madj Oweida, 22, (C) a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with...
Beersheba, Israel
Oweida, a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with breaking...
Madj Oweida, 22, (C) a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with breaking into Israeli military drone camera systems for Islamic militants and gleaning details of civilian aircraft movements, attends a court hearing at Beersheba district court in southern Israel, April 11, 2016. REUTERS/Amir Cohen
ISRAEL-PALESTINIANS/CYBERCRIME
RTX29E9A
April 11, 2016
Madj Oweida, 22, a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with...
Beersheba, Israel
Oweida, a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with breaking...
Madj Oweida, 22, a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with breaking into Israeli military drone camera systems for Islamic militants and gleaning details of civilian aircraft movements, attends a court hearing at Beersheba district court in southern Israel, April 11, 2016. REUTERS/Amir Cohen
CYBERCRIME-RUSSIA/DYRE
RTX25O6G
February 05, 2016
A general view shows the building 'Gorod Stolits' (Capital City) (C), which houses an office of 25 Floor...
Moscow, Russia
View of building which houses an office of 25 Floor Film Company in Moscow
A general view shows the building 'Gorod Stolits' (Capital City) (C), which houses an office of 25 Floor Film Company, at the Moscow International Business Center also known as "Moskva-City", in Moscow, Russia, February 3, 2016. Russian authorities in November raided offices associated with a Moscow film distribution and production company as part of a crackdown on one of the world's most notorious financial hacking operations, according to three sources with knowledge of the matter. Picture taken on February 3, 2016. REUTERS/Maxim Zmeyev
CYBERCRIME-RUSSIA/DYRE
RTX25O6F
February 05, 2016
A general view shows the building 'Gorod Stolits' (Capital City) (C), which houses an office of 25 Floor...
Moscow, Russia
View of building which houses an office of 25 Floor Film Company in Moscow
A general view shows the building 'Gorod Stolits' (Capital City) (C), which houses an office of 25 Floor Film Company, at the Moscow International Business Center also known as "Moskva-City", in Moscow, Russia, February 3, 2016. Russian authorities in November raided offices associated with a Moscow film distribution and production company as part of a crackdown on one of the world's most notorious financial hacking operations, according to three sources with knowledge of the matter. Picture taken on February 3, 2016. REUTERS/Maxim Zmeyev
ATHLETICS-CORRUPTION/WADA
RTS666H
November 09, 2015
Richard W. Pound (C), World Anti-Doping Agency (WADA) Founding President and former IOC Vice President,...
Geneva, Switzerland
Pound, WADA Founding President leaves a news conference on the WADA Independent Commission report on...
Richard W. Pound (C), World Anti-Doping Agency (WADA) Founding President and former IOC Vice President, Richard H. McLaren (L), Legal Counsel and member of the Court of Arbitration for Sport (CAS) and Guenter Younger, Head of Department Cybercrime with Bavarian Landeskriminalamt (LKA) leave a news conference on the WADA Independent Commission report on findings of investigation into allegations of widespread doping in sport in Geneva, Switzerland November 9, 2015. REUTERS/Denis Balibouse
ATHLETICS-CORRUPTION/WADA
RTS666F
November 09, 2015
Richard W. Pound (C), World Anti-Doping Agency (WADA) Founding President and former IOC Vice President...
Geneva, Switzerland
Pound, WADA Founding President speaks during a news conference on the WADA Independent Commission report...
Richard W. Pound (C), World Anti-Doping Agency (WADA) Founding President and former IOC Vice President speaks next to Richard H. McLaren (L), Legal Counsel and member of the Court of Arbitration for Sport (CAS) and Guenter Younger, Head of Department Cybercrime with Bavarian Landeskriminalamt (LKA) during a news conference on the WADA Independent Commission report on findings of investigation into allegations of widespread doping in sport in Geneva, Switzerland November 9, 2015. REUTERS/Denis Balibouse
ATHLETICS-CORRUPTION/WADA
RTS660R
November 09, 2015
Richard W. Pound (L), World Anti-Doping Agency (WADA) Founding President and former IOC Vice President...
Geneva, Switzerland
Pound, WADA Founding President speaks during a news conference on the WADA Independent Commission report...
Richard W. Pound (L), World Anti-Doping Agency (WADA) Founding President and former IOC Vice President speaks next to Guenter Younger, Head of Department Cybercrime with Bavarian Landeskriminalamt (LKA) during a news conference on the WADA Independent Commission report on findings of investigation into allegations of widespread doping in sport in Geneva, Switzerland November 9, 2015. REUTERS/Denis Balibouse
ATHLETICS-CORRUPTION/
RTS65XT
November 09, 2015
Richard W. Pound (L), World Anti-Doping Agency (WADA) Founding President and former IOC Vice President...
Geneva, Switzerland
Pound, WADA Founding President speaks during a news conference on the WADA Independent Commission report...
Richard W. Pound (L), World Anti-Doping Agency (WADA) Founding President and former IOC Vice President speaks to Ben Nichols (C) WADA communication manager next to Guenter Younger, Head of Department Cybercrime with Bavarian Landeskriminalamt (LKA) during a news conference on the WADA Independent Commission report on findings of investigation into allegations of widespread doping in sport in Geneva, Switzerland November 9, 2015. REUTERS/Denis Balibouse
ATHLETICS-CORRUPTION/
RTS65SX
November 09, 2015
Richard W. Pound (C), World Anti-Doping Agency (WADA) Founding President and former IOC Vice President...
Geneva, Switzerland
Pound, WADA Founding President speaks during a news conference on the WADA Independent Commission report...
Richard W. Pound (C), World Anti-Doping Agency (WADA) Founding President and former IOC Vice President speaks next to Richard H. McLaren (CL), Legal Counsel and member of the Court of Arbitration for Sport (CAS) and Guenter Younger, Head of Department Cybercrime with Bavarian Landeskriminalamt (LKA) during a news conference on the WADA Independent Commission report on findings of investigation into allegations of widespread doping in sport in Geneva, Switzerland November 9, 2015. REUTERS/Denis Balibouse
ATHLETICS-CORRUPTION/
RTS65SU
November 09, 2015
Richard W. Pound (L), World Anti-Doping Agency (WADA) Founding President and former IOC Vice President...
Geneva, Switzerland
Pound, WADA Founding President speaks during a news conference on the WADA Independent Commission report...
Richard W. Pound (L), World Anti-Doping Agency (WADA) Founding President and former IOC Vice President speaks next to Guenter Younger, Head of Department Cybercrime with Bavarian Landeskriminalamt (LKA) during a news conference on the WADA Independent Commission report on findings of investigation into allegations of widespread doping in sport in Geneva, Switzerland November 9, 2015. REUTERS/Denis Balibouse
ATHLETICS-CORRUPTION/
RTS65Q4
November 09, 2015
Richard W. Pound, (L) World Anti-Doping Agency (WADA) Founding President and former IOC Vice President...
Geneva, Switzerland
Pound, WADA Founding President speaks during a news conference on the WADA Independent Commission report...
Richard W. Pound, (L) World Anti-Doping Agency (WADA) Founding President and former IOC Vice President speaks next to Guenter Younger, Head of Department Cybercrime with Bavarian Landeskriminalamt (LKA) during a news conference on the WADA Independent Commission report on findings of investigation into allegations of widespread doping in sport in Geneva, Switzerland November 9, 2015. REUTERS/Denis Balibouse
ATHLETICS-CORRUPTION/
RTS65Q0
November 09, 2015
Richard W. Pound, (C) World Anti-Doping Agency (WADA) Founding President and former IOC Vice President...
Geneva, Switzerland
Pound, WADA Founding President speaks during a news conference on the WADA Independent Commission report...
Richard W. Pound, (C) World Anti-Doping Agency (WADA) Founding President and former IOC Vice President speaks next to Richard H. McLaren (L), Legal Counsel and member of the Court of Arbitration for Sport (CAS) and Guenter Younger, Head of Department Cybercrime with Bavarian Landeskriminalamt (LKA) during a news conference on the WADA Independent Commission report on findings of investigation into allegations of widespread doping in sport in Geneva, Switzerland November 9, 2015. REUTERS/Denis Balibouse
ATHLETICS-CORRUPTION/
RTS65PX
November 09, 2015
Richard W. Pound, (C) World Anti-Doping Agency (WADA) Founding President and former IOC Vice President...
Geneva, Switzerland
Pound, WADA Founding President speaks during a news conference on the WADA Independent Commission report...
Richard W. Pound, (C) World Anti-Doping Agency (WADA) Founding President and former IOC Vice President speaks next to Richard H. McLaren (L), Legal Counsel and member of the Court of Arbitration for Sport (CAS) and Guenter Younger, Head of Department Cybercrime with Bavarian Landeskriminalamt (LKA) during a news conference on the WADA Independent Commission report on findings of investigation into allegations of widespread doping in sport in Geneva, Switzerland November 9, 2015. REUTERS/Denis Balibouse
USA-CYBERSECURITY/
RTSI21
September 10, 2015
Defense Intelligence Agency Director USMC Lt. General Vincent Stewart awaits to testify at a House (Select)...
Washington, UNITED STATES
Defense Intelligence Agency Director USMC Lt. General Stewart awaits to testify at a House (Select)...
Defense Intelligence Agency Director USMC Lt. General Vincent Stewart awaits to testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSI03
September 10, 2015
Director of National Intelligence James Clapper (C) testifies at a House (Select) Intelligence Committee...
Washington, UNITED STATES
Director of National Intelligence Clapper testifies at a House (Select) Intelligence Committee hearing...
Director of National Intelligence James Clapper (C) testifies at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the U.S. Director of National Intelligence James Clapper said on Thursday. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHY6
September 10, 2015
CIA Director John Brennan (L) and the Director of National Intelligence James Clapper, (R) prepare to...
Washington, UNITED STATES
CIA Director Brennan and Director of National Intelligence Clapper prepart to testify at House (Select)...
CIA Director John Brennan (L) and the Director of National Intelligence James Clapper, (R) prepare to testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHY4
September 10, 2015
FBI Director James Comey, (R) and CIA Director John Brennan, (L) prepare to testify at a House (Select)...
Washington, UNITED STATES
FBI Director Comey and CIA Director Brennan prepare to testify at a House (Select) Intelligence Committee...
FBI Director James Comey, (R) and CIA Director John Brennan, (L) prepare to testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. REUTERS/Gary Cameron TPX IMAGES OF THE DAY
USA-CYBERSECURITY/
RTSHWW
September 10, 2015
(L-R) FBI Director James Comey, CIA Director John Brennan, Director of National Intelligence James Clapper,...
Washington, UNITED STATES
US intelligence and security leaders testify at a House (Select) Intelligence Committee hearing on "World...
(L-R) FBI Director James Comey, CIA Director John Brennan, Director of National Intelligence James Clapper, and National Security Agency Director Admiral Michael Rogers testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHWU
September 10, 2015
From L-R: CIA Director John Brennan, Director of National Intelligence James Clapper, and National Security...
Washington, UNITED STATES
U.S. intelligence and security leaders testify at a House (Select) Intelligence Committee hearing on...
From L-R: CIA Director John Brennan, Director of National Intelligence James Clapper, and National Security Agency Director Admiral Michael Rogers testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHWN
September 10, 2015
(L-R) FBI Director James Comey, CIA Director John Brennan, and Director of National Intelligence James...
Washington, UNITED STATES
U.S. intelligence and security leaders testify at a House (Select) Intelligence Committee hearing on...
(L-R) FBI Director James Comey, CIA Director John Brennan, and Director of National Intelligence James Clapper, testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHVK
September 10, 2015
Director of National Intelligence James Clapper (R) testifies, at a House (Select) Intelligence Committee...
Washington, UNITED STATES
Director of National Intelligence Clapper testifies at a House (Select) Intelligence Committee hearing...
Director of National Intelligence James Clapper (R) testifies, at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the U.S. Director of National Intelligence James Clapper said on Thursday. CIA Director John Brennan seated at left. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHUC
September 10, 2015
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee...
Washington, UNITED STATES
Director of National Intelligence Clapper testifies at a House (Select) Intelligence Committee hearing...
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the U.S. Director of National Intelligence James Clapper said on Thursday. CIA Director John Brennan is at left. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHU9
September 10, 2015
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee...
Washington, UNITED STATES
Director of National Intelligence Clapper testifies at a House (Select) Intelligence Committee hearing...
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the U.S. Director of National Intelligence James Clapper said on Thursday. CIA Director John Brennan is at left. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHU6
September 10, 2015
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee...
Washington, UNITED STATES
Director of National Intelligence Clapper testifies at a House (Select) Intelligence Committee hearing...
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the U.S. Director of National Intelligence James Clapper said on Thursday. CIA Director John Brennan is at left. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHU1
September 10, 2015
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee...
Washington, UNITED STATES
Director of National Intelligence Clapper testifies at a House (Select) Intelligence Committee hearing...
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the U.S. Director of National Intelligence James Clapper said on Thursday. CIA Director John Brennan is at left. REUTERS/Gary Cameron
USA-CYBERSECURITY/CLAPPER
RTSHTD
September 10, 2015
From L-R: FBI Director James Comey, CIA Director John Brennan, and Director of National Intelligence...
Washington, UNITED STATES
US intelligence and security directors Comey, Brennan, and Clapper arrive to testify at a House (Select)...
From L-R: FBI Director James Comey, CIA Director John Brennan, and Director of National Intelligence James Clapper arrive to testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the Clapper said on Thursday. REUTERS/Gary Cameron
USA-BLACK HAT/
RTX1N873
August 05, 2015
John Cosby (L), a solutions architect with BAE Systems, checks out an Anakin Skywalker lightsaber as...
Las Vegas, UNITED STATES
John Cosby (L), a solutions architect with BAE Systems, checks out an Anakin Skywalker lightsaber as...
John Cosby (L), a solutions architect with BAE Systems, checks out an Anakin Skywalker lightsaber as Sammi Seaman looks on at the ThreatConnect booth during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Players who get the high score of the day on an Atari Star Wars video game win a lightsaber, Seaman said. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86M
August 05, 2015
Charlie Miller speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August...
Las Vegas, UNITED STATES
Charlie Miller speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas
Charlie Miller speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Miller and Chris Valasek talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86L
August 05, 2015
Chris Valasek (L) and Charlie Miller applaud as they give a briefing during the Black Hat USA 2015 cybersecurity...
Las Vegas, UNITED STATES
Chris Valasek (L) and Charlie Miller applaud as they give a briefing during the Black Hat USA 2015 cybersecurity...
Chris Valasek (L) and Charlie Miller applaud as they give a briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Valasek and Miller talked about how they remotely hacked into a Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86K
August 05, 2015
Chris Valasek speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August...
Las Vegas, UNITED STATES
Chris Valasek speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas
Chris Valasek speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Valasek and Charlie Miller talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86J
August 05, 2015
Chris Valasek (L) and Charlie Miller give a briefing during the Black Hat USA 2015 cybersecurity conference...
Las Vegas, UNITED STATES
Chris Valasek (L) and Charlie Miller give a briefing during the Black Hat USA 2015 cybersecurity conference...
Chris Valasek (L) and Charlie Miller give a briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Valasek and Miller talked about how they remotely hacked into a Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86F
August 05, 2015
Charlie Miller (L) and Chris Valasek give a briefing during the Black Hat USA 2015 cybersecurity conference...
Las Vegas, UNITED STATES
Charlie Miller (L) and Chris Valasek give a briefing during the Black Hat USA 2015 cybersecurity conference...
Charlie Miller (L) and Chris Valasek give a briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Miller and Valasek talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86E
August 05, 2015
Attendees listen to a briefing by Charlie Miller and Chris Valasek during the Black Hat USA 2015 cybersecurity...
Las Vegas, UNITED STATES
Attendees listen to a briefing by Charlie Miller and Chris Valasek wait to give a briefing during the...
Attendees listen to a briefing by Charlie Miller and Chris Valasek during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Miller and Valacek talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86A
August 05, 2015
Charlie Miller (L) and Chris Valasek wait to give a briefing during the Black Hat USA 2015 cybersecurity...
Las Vegas, UNITED STATES
Charlie Miller (L) and Chris Valasek wait to give a briefing during the Black Hat USA 2015 cybersecurity...
Charlie Miller (L) and Chris Valasek wait to give a briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Miller and Valacek talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7TW
August 05, 2015
Colby Moore poses with a home-made reception box during a news conference at the Black Hat USA 2015 cybersecurity...
Las Vegas, UNITED STATES
Colby Moore poses with a home-made reception box during a news conference at the Black Hat USA 2015 cybersecurity...
Colby Moore poses with a home-made reception box during a news conference at the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Moore spoke on hacking a satellite network. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7TF
August 05, 2015
Colby Moore speaks on hacking a satellite network during at news conference at the Black Hat USA 2015...
Las Vegas, UNITED STATES
Colby Moore speaks on hacking a satellite network during at news conference at the Black Hat USA 2015...
Colby Moore speaks on hacking a satellite network during at news conference at the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7TE
August 05, 2015
Colby Moore speaks at a briefing on hacking a satellite network during the Black Hat USA 2015 cybersecurity...
Las Vegas, UNITED STATES
Colby Moore speaks at a briefing on hacking a satellite network during the Black Hat USA 2015 cybersecurity...
Colby Moore speaks at a briefing on hacking a satellite network during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7ST
August 05, 2015
Ang Cui of Red Balloon Security speaks at a "funtenna" briefing during the Black Hat USA 2015 cybersecurity...
Las Vegas, UNITED STATES
Ang Cui of Red Balloon Security speaks at a "funtenna" briefing during the Black Hat USA 2015 cybersecurity...
Ang Cui of Red Balloon Security speaks at a "funtenna" briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Funtenna is a hack that can turn connected devices into antennas capable of transmitting data out of a network using audio waves. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7SR
August 05, 2015
Ang Cui of Red Balloon Security speaks at a briefing titled "Emulate Like a Boss: Generalized Covert...
Las Vegas, UNITED STATES
Ang Cui of Red Balloon Security speaks at a briefing titled "Emulate Like a Boss: Generalized Covert...
Ang Cui of Red Balloon Security speaks at a briefing titled "Emulate Like a Boss: Generalized Covert Data Exfiltration with Funtenna" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Funtenna is a hack that can turn connected devices into antennas capable of transmitting data out of a network using audio waves. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7SQ
August 05, 2015
Ang Cui of Red Balloon Security speaks with attendees following a "funtenna" briefing during the Black...
Las Vegas, UNITED STATES
Ang Cui of Red Balloon Security speaks with attendees following a "funtenna" briefing during the Black...
Ang Cui of Red Balloon Security speaks with attendees following a "funtenna" briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Funtenna is a hack that can turn connected devices into antennas capable of transmitting data out of a network using audio waves. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7SP
August 05, 2015
Ang Cui of Red Balloon Security speaks a briefing titled "Emulate Like a Boss: Generalized Covert Data...
Las Vegas, UNITED STATES
Ang Cui of Red Balloon Security speaks a briefing titled "Emulate Like a Boss: Generalized Covert Data...
Ang Cui of Red Balloon Security speaks a briefing titled "Emulate Like a Boss: Generalized Covert Data Exfiltration with Funtenna" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Funtenna is a hack that can turn connected devices into antennas capable of transmitting data out of a network using audio waves. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7ES
August 05, 2015
The Black Hat logo is displayed before a keynote address by Jennifer Granick, director of civil liberties...
Las Vegas, UNITED STATES
The Black Hat logo is displayed before a keynote address by Jennifer Granick, director of civil liberties...
The Black Hat logo is displayed before a keynote address by Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7ER
August 05, 2015
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las...
Las Vegas, UNITED STATES
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cyber security conference in Las...
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EQ
August 05, 2015
Journalists, including Alice Tsuchiya (R) of Japan, listen to a keynote speech by Jennifer Granick, director...
Las Vegas, UNITED STATES
Journalists, including Alice Tsuchiya (R) of Japan, listen to a keynote speech by Jennifer Granick, director...
Journalists, including Alice Tsuchiya (R) of Japan, listen to a keynote speech by Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EP
August 05, 2015
People arrive at the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015....
Las Vegas, UNITED STATES
People arrive at Black Hat USA 2015 cybersecurity conference in Las Vegas
People arrive at the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EO
August 05, 2015
People listen to a keynote address by Jennifer Granick, director of civil liberties at the Stanford Center...
Las Vegas, UNITED STATES
People listen to keynote address by Jennifer Granick, director of civil liberties at Stanford Center...
People listen to a keynote address by Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EN
August 05, 2015
Jeff Moss,founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las...
Las Vegas, UNITED STATES
Jeff Moss,founder of Black Hat, speaks during the Black Hat USA 2015 cyber security conference in Las...
Jeff Moss,founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EH
August 05, 2015
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las...
Las Vegas, UNITED STATES
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cyber security conference in Las...
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EG
August 05, 2015
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Las Vegas, UNITED STATES
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers a keynote speech titled "The Lifecycle of a Revolution" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EE
August 05, 2015
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Las Vegas, UNITED STATES
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers a keynote speech titled "The Lifecycle of a Revolution" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7ED
August 05, 2015
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Las Vegas, UNITED STATES
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers a keynote speech titled "The Lifecycle of a Revolution" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EC
August 05, 2015
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las...
Las Vegas, UNITED STATES
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cyber security conference in Las...
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7DT
August 05, 2015
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Las Vegas, UNITED STATES
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers a keynote speech titled "The Lifecycle of a Revolution" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
Technology
Technology
Cyber Security - 05 Jun 2015
16 PICTURES
GEMALTO-CYBERCRIME/
RTR4QX48
February 24, 2015
SIM cards are reflected on a monitor showing binary digits in this photo illustration taken in Sarajevo...
Sarajevo, Bosnia and Herzegovina
SIM cards are reflected on a monitor showing binary digits in this photo illustration taken in Sarajevo...
SIM cards are reflected on a monitor showing binary digits in this photo illustration taken in Sarajevo February 23, 2015. Gemalto said February 23, 2015 its initial investigations into a report that U.S. and British spies had hacked it systems showed its products were secure and it thus did not expect a significant financial prejudice. The hack into the world's biggest maker of phone SIM cards allowed the spies to potentially monitor the calls, texts and emails of billions of mobile users around the world, the investigative news website reported. Gemalto makes smart chips for mobile phones, bank cards and biometric passports and counts Verizon , AT&T Inc. and Vodafone among its 450 wireless network provider customers around the world. Picture was taken February 23, 2015. REUTERS/Dado Ruvic (BOSNIA AND HERZEGOVINA - Tags: SCIENCE TECHNOLOGY BUSINESS TELECOMS POLITICS CRIME LAW TPX IMAGES OF THE DAY)
USA-OBAMA/
RTR4PIGT
February 13, 2015
U.S. President Barack Obama looks up as he signs an Executive Order to encourage and promote sharing...
Palo Alto, UNITED STATES
Obama signs an Executive Order at the Summit on Cybersecurity and Consumer Protection in Palo Alto, California...
U.S. President Barack Obama looks up as he signs an Executive Order to encourage and promote sharing of cybersecurity threat information within the private sector and between the private sector and government after speaking at the Summit on Cybersecurity and Consumer Protection at Stanford University in Palo Alta, California February 13, 2015. The aim of the summit is to build support for beefing up cyber security laws in the wake of massive hacked at Target, Sony and Anthem. REUTERS/Kevin Lamarque (UNITED STATES - Tags: POLITICS BUSINESS SCIENCE TECHNOLOGY TPX IMAGES OF THE DAY)
MALAYSIA -AIRLINE/CYBERCRIME
RTR4MVVA
January 26, 2015
A screen grab of the official website of national carrier Malaysia Airlines after it was hacked on January...
Malaysia
A screen grab of the official website of national carrier Malaysia Airlines after it was hacked by...
A screen grab of the official website of national carrier Malaysia Airlines after it was hacked on January 26, 2015 by a group calling itself the "Official Cyber Caliphate". The website, www.malaysiaairlines.com, currently shows a photograph of a lizard in a top hat and tuxedo, surrounded by the messages '404 - Plane Not Found' and 'Hacked by Lizard Squad Official Cyber Caliphate'. Representatives from the airline did not respond to calls by Reuters. MAS was hit by twin air disasters last year: the disappearance of Flight MH370 in March and the shooting down of Flight MH17 a few months later. The government took the airline private late last year. REUTERS/Handout (MALAYSIA - Tags: TRANSPORT CRIME LAW BUSINESS TRAVEL)
CYBERSECURITY-CENTCOM/HACK
RTR4L5BH
January 12, 2015
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people...
Washington, UNITED STATES
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people...
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people claiming to be Islamic State sympathizers January 12, 2015. The hackers published apparent intelligence material and what they said were names and addresses of military personnel. REUTERS/Staff (UNITED STATES - Tags: MILITARY CRIME LAW POLITICS)
Sort by
Display
Items per page
Page
of 5