Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy.

Can't find what you're looking for?

 

Be sure to Sign in to see all available content.

 

If you don't have an account, Register here.

Search results for: Cyberwarfare

CYBER-ATTACK/BRITAIN
RTX35W56
May 15, 2017
Cables and computers are seen inside a data centre at an office in the heart of the financial district...
London, United Kingdom
Cables and computers are seen inside a data centre at an office in the heart of the financial district...
Cables and computers are seen inside a data centre at an office in the heart of the financial district in London, Britain May 15, 2017. REUTERS/Dylan Martinez
CYBER-ATTACK/BRITAIN
RTX35W55
May 15, 2017
Cables and computers are seen inside a data centre at an office in the heart of the financial district...
London, United Kingdom
Cables and computers are seen inside a data centre at an office in the heart of the financial district...
Cables and computers are seen inside a data centre at an office in the heart of the financial district in London, Britain May 15, 2017. REUTERS/Dylan Martinez
USA-SECURITY/
RTX1L9TJ
July 21, 2015
MSgt Steven Bennett (L), NCOIC of the Boundary Workshop and SSgt Michael James talk the 561st Network...
Colorado Springs, UNITED STATES
MSgt Steven Bennett, NCOIC of the Boundary Workshop and SSgt Michael James talk the 561st Network Operations...
MSgt Steven Bennett (L), NCOIC of the Boundary Workshop and SSgt Michael James talk the 561st Network Operations Squadron (NOS), at Petersen Air Force Base in Colorado Springs, Colorado July 20, 2015. The 561st NOS executes defensive cyber operations in response to U.S. Cyber Command orders and intelligence based threats. REUTERS/Rick Wilking
USA-SECURITY/
RTX1L45I
July 20, 2015
A U.S. Air Force airman works at the 561st Network Operations Squadron (NOS) under the data wall with...
Colorado Springs, UNITED STATES
A U.S. Air Force airman works at the 561st Network Operations Squadron (NOS) under the data wall with...
A U.S. Air Force airman works at the 561st Network Operations Squadron (NOS) under the data wall with screens blanked during a reporter's visit at Petersen Air Force Base in Colorado Springs, Colorado July 20, 2015. The 561st NOS executes defensive cyber operations in response to U.S. Cyber Command orders and intelligence based threats. REUTERS/Rick Wilking TPX IMAGES OF THE DAY
USA-OBAMA/
RTR4LBN0
January 13, 2015
Department of Homeland Security workers at the National Cybersecurity and Communications Integration...
Arlington, UNITED STATES
Department of Homeland Security workers at the National Cybersecurity and Communications Integration...
Department of Homeland Security workers at the National Cybersecurity and Communications Integration Center in Arlington, Virginia, January 13, 2015. REUTERS/Larry Downing (UNITED STATES - Tags: POLITICS SCIENCE TECHNOLOGY CRIME LAW MILITARY)
USA-OBAMA/
RTR4LBMO
January 13, 2015
A Department of Homeland Security worker listens to U.S. President Barack Obama talk at the National...
Arlington, UNITED STATES
A Department of Homeland Security worker listen to U.S. President Barack Obama talk at the National Cybersecurity...
A Department of Homeland Security worker listens to U.S. President Barack Obama talk at the National Cybersecurity and Communications Integration Center in Arlington, Virginia, January 13, 2015. REUTERS/Larry Downing (UNITED STATES - Tags: POLITICS SCIENCE TECHNOLOGY CRIME LAW MILITARY)
HACKING-TOOL/
RTR4JEYR
December 28, 2014
People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration...
Zenica, Bosnia and Herzegovina
People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration...
People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration taken in Zenica December 27, 2014. A previously undisclosed hacking campaign against military targets in Israel and Europe is probably backed by a country that misused security-testing software to cover its tracks and enhance its capability, researchers said. Picture taken December 27, 2014. REUTERS/Dado Ruvic (BOSNIA AND HERZEGOVINA - Tags: SCIENCE TECHNOLOGY CRIME LAW)
CYBERSECURITY-HACKING/
RTR41HX3
August 06, 2014
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker...
Las Vegas, UNITED STATES
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker...
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS)
CYBERSECURITY-HACKERS/
RTR41DIB
August 06, 2014
Tani Currin, marketing events manager for computer security software and hardware developer Sophos, holds...
Las Vegas, UNITED STATES
Currin, marketing events manager for Sophos, holds an "anti-selfie" mask during the Black Hat USA 2014...
Tani Currin, marketing events manager for computer security software and hardware developer Sophos, holds an "anti-selfie" mask during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 5, 2014. The mask is part of a privacy awareness marketing campaign, she said. Sophos is a developer of computer security software and hardware. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY BUSINESS SOCIETY)
JAPAN-CYBER-DEFENCE/
RTR3FFDG
September 30, 2013
Participants from government ministries and agencies take part in the Cyber Defense Exercise with Recurrence...
Tokyo, Japan
Participants from government ministries and agencies take part in the CYDER in Tokyo
Participants from government ministries and agencies take part in the Cyber Defense Exercise with Recurrence (CYDER) in Tokyo September 25, 2013. Civil servants from across Japan recently gathered at Japan's Interior Ministry for the first time to train to defend themselves against a cyber assault. Japan has no central agency tasked with defending the nation in cyberspace, and technicians from Japan's key ministries have been brought in to test their skills. Officials say the threat from hackers is rising, and upping Japan's game is increasingly urgent. Picture taken September 25, 2013. REUTERS/Toru Hanai (JAPAN - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY)
GERMANY
RTX121E4
July 27, 2013
A protester holds a poster depicting German Chancellor Angela Merkel as he attends a demonstration against...
Berlin, Germany
A protester holds a poster depicting German Chancellor Merkel as he attends a demonstration against secret...
A protester holds a poster depicting German Chancellor Angela Merkel as he attends a demonstration against secret monitoring programmes PRISM, TEMPORA, INDECT and showing solidarity with whistleblowers Edward Snowden, Bradley Manning and others in front of Berlin's Brandenburg gate July 27, 2013. REUTERS/Pawel Kopczynski (GERMANY - Tags: CRIME LAW POLITICS CIVIL UNREST)
USA-SECURITY-SNOWDEN-LIES
RTX10R38
June 17, 2013
A live chat of Edward Snowden, former contractor at the National Security Agency (NSA), is monitored...
Hong Kong, China
A live chat of Edward Snowden is monitored by Tom Grundy on a screen at his home in Hong Kong
A live chat of Edward Snowden, former contractor at the National Security Agency (NSA), is monitored by Tom Grundy, co-organizer of a rally that was held on Saturday supporting Snowden, on a screen at his home in Hong Kong June 17, 2013. Snowden, the American who leaked details about U.S. National Security Agency surveillance programs, said on Monday he decided to disclose the information after observing "a continuing litany of lies" from senior officials to Congress. REUTERS/Bobby Yip (CHINA - Tags: POLITICS CRIME LAW SCIENCE TECHNOLOGY)
USA-SECURITY-CHINA-SNOWDEN/
RTX10LY6
June 13, 2013
Protesters supporting Edward Snowden, a contractor at the National Security Agency (NSA), hold a photo...
Hong Kong, China
Protesters supporting Snowden hold a photo of him during a demonstration outside the U.S. Consulate in...
Protesters supporting Edward Snowden, a contractor at the National Security Agency (NSA), hold a photo of Snowden during a demonstration outside the U.S. Consulate in Hong Kong June 13, 2013. China's Foreign Ministry offered no details on Thursday on Snowden, the National Security Agency contractor who revealed the U.S. government's top-secret monitoring of phone and Internet data and who is in hiding in Hong Kong. REUTERS/Bobby Yip (CHINA - Tags: POLITICS SCIENCE TECHNOLOGY CIVIL UNREST TPX IMAGES OF THE DAY)
USA-CYBERSECURITY/
RTX10LF4
June 12, 2013
General Keith Alexander, commander of the U.S. Cyber Command, director of the National Security Agency...
Washington, UNITED STATES
General Keith Alexander arrives at a Senate Appropriations Committee hearing in Washington
General Keith Alexander, commander of the U.S. Cyber Command, director of the National Security Agency (NSA) and chief of the Central Security Service (CSS), arrives at the Senate Appropriations Committee hearing on Cybersecurity: Preparing for and Responding to the Enduring Threat, on Capitol Hill in Washington June 12, 2013. REUTERS/Yuri Gripas (UNITED STATES - Tags: POLITICS MILITARY SCIENCE TECHNOLOGY TPX IMAGES OF THE DAY)
INTERNET-ATTACK/
RTXXZVX
March 27, 2013
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. One...
Warsaw, Poland
Illustration file picture shows a man typing on a computer keyboard in Warsaw
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. One of the largest ever cyber attacks is slowing global internet services after an organisation blocking "spam" content became a target, with some experts saying the disruption could get worse. To match INTERNET-ATTACK/ REUTERS/Kacper Pempel/Files (POLAND - Tags: BUSINESS SCIENCE TECHNOLOGY)
CYBERSECURITY/IRAN
RTR2UQCC
December 02, 2011
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences...
Charlotte, UNITED STATES
To match Insight - CYBERSECURITY/IRAN
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, works on his laptop computer during a portrait session in Charlotte, North Carolina December 1, 2011. A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious worm that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet, according to research Bumgarner, a retired U.S. Army special-operations veteran and former intelligence officer. To match Insight - CYBERSECURITY/IRAN REUTERS/John Adkisson (UNITED STATES - Tags: SCIENCE TECHNOLOGY MILITARY)
CYBERSECURITY/IRAN
RTR2UQCA
December 02, 2011
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences...
Charlotte, UNITED STATES
To match Insight - CYBERSECURITY/IRAN
John Bumgarner, a cyber warfare expert who is chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, holds a notebook computer while posing for a portrait in Charlotte December 1, 2011. A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious worm that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet, according to research Bumgarner, a retired U.S. Army special-operations veteran and former intelligence officer. To match Insight - CYBERSECURITY/IRAN REUTERS/John Adkisson (UNITED STATES - Tags: SCIENCE TECHNOLOGY MILITARY)
Technology
Technology
Top Secret Cyber Security Center - 07 Oct 2011
15 PICTURES
USA/
RTR2S0PH
September 28, 2011
A sign lists prohibited items on a door leading to a watch and warning center of a cyber security defense...
Idaho Falls, UNITED STATES
A sign lists prohibited items on a door leading to a watch and warning center of a cyber security defense...
A sign lists prohibited items on a door leading to a watch and warning center of a cyber security defense lab at the Idaho National Laboratory in Idaho Falls, Idaho September 29, 2011. REUTERS/Jim Urquhart (UNITED STATES - Tags: CRIME LAW MILITARY POLITICS SCIENCE TECHNOLOGY)
USA-CYBERWAR/
RTXT2ZC
October 05, 2010
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center...
Colorado Springs, UNITED STATES
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center...
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2Z7
October 05, 2010
TSgt James Ortiz, shift lead, boundary protection looks over a rack in the server room at the Air Force...
Colorado Springs, UNITED STATES
TSgt James Ortiz looks over a rack in the server room at the Air Force Space Command Network Operations...
TSgt James Ortiz, shift lead, boundary protection looks over a rack in the server room at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2WG
October 05, 2010
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center...
Colorado Springs, UNITED STATES
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center...
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2VH
October 05, 2010
A map is displayed on one of the screens at the Air Force Space Command Network Operations & Security...
Colorado Springs, UNITED STATES
A map is displayed on one of the screens at the Air Force Space Command Network Operations & Security...
A map is displayed on one of the screens at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2UX
October 05, 2010
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center...
Colorado Springs, UNITED STATES
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center...
Josh Mayeux, network defender, works at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH CIVIL UNREST)
USA-CYBERWAR/
RTXT2UT
October 05, 2010
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force...
Colorado Springs, UNITED STATES
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force...
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2UR
October 05, 2010
MSgt Michael Gregory, senior operations controller, works at the Air Force Space Command Network Operations...
Colorado Springs, UNITED STATES
MSgt Michael Gregory, works at the Air Force Space Command Network Operations & Security Center at Peterson...
MSgt Michael Gregory, senior operations controller, works at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH CIVIL UNREST)
USA-CYBERWAR/
RTXT2UN
October 05, 2010
Rear Admiral Mike Brown, deputy assistant secretary for Cyber Security and Communications, briefs the...
Arlington, UNITED STATES
Rear Admiral Mike Brown, deputy assistant secretary for Cyber Security and Communications, briefs the...
Rear Admiral Mike Brown, deputy assistant secretary for Cyber Security and Communications, briefs the media on Cyber Storm III exercise at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia on September 24, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Hyungwon Kang (UNITED STATES - Tags: CRIME LAW SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2SX
October 05, 2010
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration...
Arlington, UNITED STATES
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration...
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia on September 24, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Hyungwon Kang (UNITED STATES - Tags: CRIME LAW SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2SN
October 05, 2010
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration...
Arlington, UNITED STATES
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration...
U.S. Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia September 24, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Hyungwon Kang (UNITED STATES - Tags: CRIME LAW SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2SH
October 05, 2010
An analyst from the U.S. Department of Homeland Security is pictured at the National Cybersecurity &...
Arlington, UNITED STATES
U.S. Department of Homeland Security analyst is pictured at the National Cybersecurity & Communications...
An analyst from the U.S. Department of Homeland Security is pictured at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia on September 24, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Hyungwon Kang (UNITED STATES - Tags: CRIME LAW SCI TECH POLITICS)
USA-CYBERWAR/
RTXT2YB
October 04, 2010
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force...
Colorado Springs, UNITED STATES
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force...
Personnel work at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010. U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes. The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets. To match Special Report USA-CYBERWAR/ REUTERS/Rick Wilking (UNITED STATES - Tags: MILITARY SCI TECH POLITICS)
SECURITY-ISRAEL/CYBERWARFARE
RTXRVGO
December 15, 2009
Major-General Amos Yadlin, Israel's chief of military intelligence, speaks at the annual Institute for...
Tel Aviv, Israel
Major-General Yadlin, Israel's chief of military intelligence, speaks at INSS conference in Tel Aviv
Major-General Amos Yadlin, Israel's chief of military intelligence, speaks at the annual Institute for National Security Studies (INSS) conference in Tel Aviv December 15, 2009. Israel is parlaying civilian technological advances into a cyberwarfare capability against its enemies, Yadlin, a senior Israeli general, said on Tuesday in a rare public disclosure about the secret programme. REUTERS/Gil Cohen Magen (ISRAEL - Tags: MILITARY POLITICS SCI TECH)
Sort by
Display
Items per page
Page
of 1