Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy.

Can't find what you're looking for?

 

Be sure to Sign in to see all available content.

 

If you don't have an account, Register here.

Search results for: Hi-tech-crime

CYBER-ATTACK/
RTX35OS3
May 13, 2017
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on...
Warsaw, Poland
Man holds laptop computer as cyber code is projected on him in this illustration picture
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35OS1
May 13, 2017
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on...
Warsaw, Poland
Man holds laptop computer as cyber code is projected on him in this illustration picture
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35OS0
May 13, 2017
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on...
Warsaw, Poland
Man holds laptop computer as cyber code is projected on him in this illustration picture
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35ORW
May 13, 2017
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken...
Warsaw, Poland
Hooded man holds laptop computer as cyber code is projected on him in this illustration picture
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35ORT
May 13, 2017
A projection of cyber code on a hooded man is pictured in this illustration picture taken on May 13,...
Warsaw, Poland
Projection of cyber code on hooded man is pictured in this illustration picture
A projection of cyber code on a hooded man is pictured in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration TPX IMAGES OF THE DAY
CYBER-ATTACK/
RTX35ORR
May 13, 2017
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken...
Warsaw, Poland
Hooded man holds a laptop computer as cyber code is projected on him in this illustration picture
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS/Kacper Pempel/Illustration
USA-CYBERSECURITY/
RTSI21
September 10, 2015
Defense Intelligence Agency Director USMC Lt. General Vincent Stewart awaits to testify at a House (Select)...
Washington, UNITED STATES
Defense Intelligence Agency Director USMC Lt. General Stewart awaits to testify at a House (Select)...
Defense Intelligence Agency Director USMC Lt. General Vincent Stewart awaits to testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSI03
September 10, 2015
Director of National Intelligence James Clapper (C) testifies at a House (Select) Intelligence Committee...
Washington, UNITED STATES
Director of National Intelligence Clapper testifies at a House (Select) Intelligence Committee hearing...
Director of National Intelligence James Clapper (C) testifies at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the U.S. Director of National Intelligence James Clapper said on Thursday. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHY6
September 10, 2015
CIA Director John Brennan (L) and the Director of National Intelligence James Clapper, (R) prepare to...
Washington, UNITED STATES
CIA Director Brennan and Director of National Intelligence Clapper prepart to testify at House (Select)...
CIA Director John Brennan (L) and the Director of National Intelligence James Clapper, (R) prepare to testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHY4
September 10, 2015
FBI Director James Comey, (R) and CIA Director John Brennan, (L) prepare to testify at a House (Select)...
Washington, UNITED STATES
FBI Director Comey and CIA Director Brennan prepare to testify at a House (Select) Intelligence Committee...
FBI Director James Comey, (R) and CIA Director John Brennan, (L) prepare to testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. REUTERS/Gary Cameron TPX IMAGES OF THE DAY
USA-CYBERSECURITY/
RTSHWW
September 10, 2015
(L-R) FBI Director James Comey, CIA Director John Brennan, Director of National Intelligence James Clapper,...
Washington, UNITED STATES
US intelligence and security leaders testify at a House (Select) Intelligence Committee hearing on "World...
(L-R) FBI Director James Comey, CIA Director John Brennan, Director of National Intelligence James Clapper, and National Security Agency Director Admiral Michael Rogers testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHWU
September 10, 2015
From L-R: CIA Director John Brennan, Director of National Intelligence James Clapper, and National Security...
Washington, UNITED STATES
U.S. intelligence and security leaders testify at a House (Select) Intelligence Committee hearing on...
From L-R: CIA Director John Brennan, Director of National Intelligence James Clapper, and National Security Agency Director Admiral Michael Rogers testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHWN
September 10, 2015
(L-R) FBI Director James Comey, CIA Director John Brennan, and Director of National Intelligence James...
Washington, UNITED STATES
U.S. intelligence and security leaders testify at a House (Select) Intelligence Committee hearing on...
(L-R) FBI Director James Comey, CIA Director John Brennan, and Director of National Intelligence James Clapper, testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHVK
September 10, 2015
Director of National Intelligence James Clapper (R) testifies, at a House (Select) Intelligence Committee...
Washington, UNITED STATES
Director of National Intelligence Clapper testifies at a House (Select) Intelligence Committee hearing...
Director of National Intelligence James Clapper (R) testifies, at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the U.S. Director of National Intelligence James Clapper said on Thursday. CIA Director John Brennan seated at left. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHUC
September 10, 2015
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee...
Washington, UNITED STATES
Director of National Intelligence Clapper testifies at a House (Select) Intelligence Committee hearing...
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the U.S. Director of National Intelligence James Clapper said on Thursday. CIA Director John Brennan is at left. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHU9
September 10, 2015
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee...
Washington, UNITED STATES
Director of National Intelligence Clapper testifies at a House (Select) Intelligence Committee hearing...
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the U.S. Director of National Intelligence James Clapper said on Thursday. CIA Director John Brennan is at left. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHU6
September 10, 2015
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee...
Washington, UNITED STATES
Director of National Intelligence Clapper testifies at a House (Select) Intelligence Committee hearing...
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the U.S. Director of National Intelligence James Clapper said on Thursday. CIA Director John Brennan is at left. REUTERS/Gary Cameron
USA-CYBERSECURITY/
RTSHU1
September 10, 2015
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee...
Washington, UNITED STATES
Director of National Intelligence Clapper testifies at a House (Select) Intelligence Committee hearing...
Director of National Intelligence James Clapper (R) testifies at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the U.S. Director of National Intelligence James Clapper said on Thursday. CIA Director John Brennan is at left. REUTERS/Gary Cameron
USA-CYBERSECURITY/CLAPPER
RTSHTD
September 10, 2015
From L-R: FBI Director James Comey, CIA Director John Brennan, and Director of National Intelligence...
Washington, UNITED STATES
US intelligence and security directors Comey, Brennan, and Clapper arrive to testify at a House (Select)...
From L-R: FBI Director James Comey, CIA Director John Brennan, and Director of National Intelligence James Clapper arrive to testify at a House (Select) Intelligence Committee hearing on "World Wide Cyber Threats" on Capitol Hill in Washington September 10, 2015. Chinese cyber espionage continues to target a "broad spectrum of U.S. interests," including national security information, sensitive economic data and intellectual property, the Clapper said on Thursday. REUTERS/Gary Cameron
USA-BLACK HAT/
RTX1N873
August 05, 2015
John Cosby (L), a solutions architect with BAE Systems, checks out an Anakin Skywalker lightsaber as...
Las Vegas, UNITED STATES
John Cosby (L), a solutions architect with BAE Systems, checks out an Anakin Skywalker lightsaber as...
John Cosby (L), a solutions architect with BAE Systems, checks out an Anakin Skywalker lightsaber as Sammi Seaman looks on at the ThreatConnect booth during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Players who get the high score of the day on an Atari Star Wars video game win a lightsaber, Seaman said. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86M
August 05, 2015
Charlie Miller speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August...
Las Vegas, UNITED STATES
Charlie Miller speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas
Charlie Miller speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Miller and Chris Valasek talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86L
August 05, 2015
Chris Valasek (L) and Charlie Miller applaud as they give a briefing during the Black Hat USA 2015 cybersecurity...
Las Vegas, UNITED STATES
Chris Valasek (L) and Charlie Miller applaud as they give a briefing during the Black Hat USA 2015 cybersecurity...
Chris Valasek (L) and Charlie Miller applaud as they give a briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Valasek and Miller talked about how they remotely hacked into a Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86K
August 05, 2015
Chris Valasek speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August...
Las Vegas, UNITED STATES
Chris Valasek speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas
Chris Valasek speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Valasek and Charlie Miller talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86J
August 05, 2015
Chris Valasek (L) and Charlie Miller give a briefing during the Black Hat USA 2015 cybersecurity conference...
Las Vegas, UNITED STATES
Chris Valasek (L) and Charlie Miller give a briefing during the Black Hat USA 2015 cybersecurity conference...
Chris Valasek (L) and Charlie Miller give a briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Valasek and Miller talked about how they remotely hacked into a Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86F
August 05, 2015
Charlie Miller (L) and Chris Valasek give a briefing during the Black Hat USA 2015 cybersecurity conference...
Las Vegas, UNITED STATES
Charlie Miller (L) and Chris Valasek give a briefing during the Black Hat USA 2015 cybersecurity conference...
Charlie Miller (L) and Chris Valasek give a briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Miller and Valasek talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86E
August 05, 2015
Attendees listen to a briefing by Charlie Miller and Chris Valasek during the Black Hat USA 2015 cybersecurity...
Las Vegas, UNITED STATES
Attendees listen to a briefing by Charlie Miller and Chris Valasek wait to give a briefing during the...
Attendees listen to a briefing by Charlie Miller and Chris Valasek during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Miller and Valacek talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N86A
August 05, 2015
Charlie Miller (L) and Chris Valasek wait to give a briefing during the Black Hat USA 2015 cybersecurity...
Las Vegas, UNITED STATES
Charlie Miller (L) and Chris Valasek wait to give a briefing during the Black Hat USA 2015 cybersecurity...
Charlie Miller (L) and Chris Valasek wait to give a briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Miller and Valacek talked about how they remotely hacked into a 2014 Jeep Cherokee. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7TW
August 05, 2015
Colby Moore poses with a home-made reception box during a news conference at the Black Hat USA 2015 cybersecurity...
Las Vegas, UNITED STATES
Colby Moore poses with a home-made reception box during a news conference at the Black Hat USA 2015 cybersecurity...
Colby Moore poses with a home-made reception box during a news conference at the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Moore spoke on hacking a satellite network. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7TF
August 05, 2015
Colby Moore speaks on hacking a satellite network during at news conference at the Black Hat USA 2015...
Las Vegas, UNITED STATES
Colby Moore speaks on hacking a satellite network during at news conference at the Black Hat USA 2015...
Colby Moore speaks on hacking a satellite network during at news conference at the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7TE
August 05, 2015
Colby Moore speaks at a briefing on hacking a satellite network during the Black Hat USA 2015 cybersecurity...
Las Vegas, UNITED STATES
Colby Moore speaks at a briefing on hacking a satellite network during the Black Hat USA 2015 cybersecurity...
Colby Moore speaks at a briefing on hacking a satellite network during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7ST
August 05, 2015
Ang Cui of Red Balloon Security speaks at a "funtenna" briefing during the Black Hat USA 2015 cybersecurity...
Las Vegas, UNITED STATES
Ang Cui of Red Balloon Security speaks at a "funtenna" briefing during the Black Hat USA 2015 cybersecurity...
Ang Cui of Red Balloon Security speaks at a "funtenna" briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Funtenna is a hack that can turn connected devices into antennas capable of transmitting data out of a network using audio waves. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7SR
August 05, 2015
Ang Cui of Red Balloon Security speaks at a briefing titled "Emulate Like a Boss: Generalized Covert...
Las Vegas, UNITED STATES
Ang Cui of Red Balloon Security speaks at a briefing titled "Emulate Like a Boss: Generalized Covert...
Ang Cui of Red Balloon Security speaks at a briefing titled "Emulate Like a Boss: Generalized Covert Data Exfiltration with Funtenna" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Funtenna is a hack that can turn connected devices into antennas capable of transmitting data out of a network using audio waves. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7SQ
August 05, 2015
Ang Cui of Red Balloon Security speaks with attendees following a "funtenna" briefing during the Black...
Las Vegas, UNITED STATES
Ang Cui of Red Balloon Security speaks with attendees following a "funtenna" briefing during the Black...
Ang Cui of Red Balloon Security speaks with attendees following a "funtenna" briefing during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Funtenna is a hack that can turn connected devices into antennas capable of transmitting data out of a network using audio waves. REUTERS/Steve Marcus
USA-BLACK HAT/
RTX1N7SP
August 05, 2015
Ang Cui of Red Balloon Security speaks a briefing titled "Emulate Like a Boss: Generalized Covert Data...
Las Vegas, UNITED STATES
Ang Cui of Red Balloon Security speaks a briefing titled "Emulate Like a Boss: Generalized Covert Data...
Ang Cui of Red Balloon Security speaks a briefing titled "Emulate Like a Boss: Generalized Covert Data Exfiltration with Funtenna" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. Funtenna is a hack that can turn connected devices into antennas capable of transmitting data out of a network using audio waves. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7ES
August 05, 2015
The Black Hat logo is displayed before a keynote address by Jennifer Granick, director of civil liberties...
Las Vegas, UNITED STATES
The Black Hat logo is displayed before a keynote address by Jennifer Granick, director of civil liberties...
The Black Hat logo is displayed before a keynote address by Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7ER
August 05, 2015
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las...
Las Vegas, UNITED STATES
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cyber security conference in Las...
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EQ
August 05, 2015
Journalists, including Alice Tsuchiya (R) of Japan, listen to a keynote speech by Jennifer Granick, director...
Las Vegas, UNITED STATES
Journalists, including Alice Tsuchiya (R) of Japan, listen to a keynote speech by Jennifer Granick, director...
Journalists, including Alice Tsuchiya (R) of Japan, listen to a keynote speech by Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EP
August 05, 2015
People arrive at the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015....
Las Vegas, UNITED STATES
People arrive at Black Hat USA 2015 cybersecurity conference in Las Vegas
People arrive at the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EO
August 05, 2015
People listen to a keynote address by Jennifer Granick, director of civil liberties at the Stanford Center...
Las Vegas, UNITED STATES
People listen to keynote address by Jennifer Granick, director of civil liberties at Stanford Center...
People listen to a keynote address by Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EN
August 05, 2015
Jeff Moss,founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las...
Las Vegas, UNITED STATES
Jeff Moss,founder of Black Hat, speaks during the Black Hat USA 2015 cyber security conference in Las...
Jeff Moss,founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EH
August 05, 2015
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las...
Las Vegas, UNITED STATES
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cyber security conference in Las...
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EG
August 05, 2015
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Las Vegas, UNITED STATES
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers a keynote speech titled "The Lifecycle of a Revolution" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EE
August 05, 2015
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Las Vegas, UNITED STATES
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers a keynote speech titled "The Lifecycle of a Revolution" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7ED
August 05, 2015
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Las Vegas, UNITED STATES
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers a keynote speech titled "The Lifecycle of a Revolution" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7EC
August 05, 2015
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las...
Las Vegas, UNITED STATES
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cyber security conference in Las...
Jeff Moss, founder of Black Hat, speaks during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
HACKING-ANTENNA/
RTX1N7DT
August 05, 2015
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Las Vegas, UNITED STATES
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers...
Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, delivers a keynote speech titled "The Lifecycle of a Revolution" during the Black Hat USA 2015 cybersecurity conference in Las Vegas, Nevada August 5, 2015. REUTERS/Steve Marcus
Technology
Technology
Cyber Security - 05 Jun 2015
16 PICTURES
USA-POLICE/MISSOURI-PROTESTS
RTR4TB4P
March 14, 2015
Ferguson Burger Bar owner Charles Davis looks out through the window of his restaurant in Ferguson, Missouri,...
FERGUSON, UNITED STATES
Ferguson Burger Bar owner Charles Davis looks out through the window of his restaurant in Ferguson, Missouri...
Ferguson Burger Bar owner Charles Davis looks out through the window of his restaurant in Ferguson, Missouri, March 13, 2015. The Burger Bar was at the center of heavy rioting and looting last year, and Davis said he believes protests have done their work. Davis's business, which opened the day before Michael Brown, an unarmed black 18-year-old, was shot by a white policeman, has been helped by a program of the activist group Hands Up United, which teaches tech skills to local youths. REUTERS/Jim Young (UNITED STATES - Tags: CRIME LAW CIVIL UNREST BUSINESS FOOD)
USA-OBAMA/
RTR4PIGT
February 13, 2015
U.S. President Barack Obama looks up as he signs an Executive Order to encourage and promote sharing...
Palo Alto, UNITED STATES
Obama signs an Executive Order at the Summit on Cybersecurity and Consumer Protection in Palo Alto, California...
U.S. President Barack Obama looks up as he signs an Executive Order to encourage and promote sharing of cybersecurity threat information within the private sector and between the private sector and government after speaking at the Summit on Cybersecurity and Consumer Protection at Stanford University in Palo Alta, California February 13, 2015. The aim of the summit is to build support for beefing up cyber security laws in the wake of massive hacked at Target, Sony and Anthem. REUTERS/Kevin Lamarque (UNITED STATES - Tags: POLITICS BUSINESS SCIENCE TECHNOLOGY TPX IMAGES OF THE DAY)
CYBERSECURITY-CENTCOM/HACK
RTR4L5BH
January 12, 2015
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people...
Washington, UNITED STATES
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people...
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people claiming to be Islamic State sympathizers January 12, 2015. The hackers published apparent intelligence material and what they said were names and addresses of military personnel. REUTERS/Staff (UNITED STATES - Tags: MILITARY CRIME LAW POLITICS)
NORTHKOREA-CYBERATTACK/
RTR4JTRA
January 01, 2015
FireEye information analysts work at the company's office in Milpitas, California, December 29, 2014....
MILPITAS, UNITED STATES
FireEye information analysts work at the company's office in Milpitas, California
FireEye information analysts work at the company's office in Milpitas, California, December 29, 2014. FireEye is the security firm hired by Sony to investigate last month's cyberattack against Sony Pictures. Picture taken December 29. REUTERS/Beck Diefenbach (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
HACKING-TOOL/
RTR4JEYR
December 28, 2014
People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration...
Zenica, Bosnia and Herzegovina
People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration...
People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration taken in Zenica December 27, 2014. A previously undisclosed hacking campaign against military targets in Israel and Europe is probably backed by a country that misused security-testing software to cover its tracks and enhance its capability, researchers said. Picture taken December 27, 2014. REUTERS/Dado Ruvic (BOSNIA AND HERZEGOVINA - Tags: SCIENCE TECHNOLOGY CRIME LAW)
HACKING-TOOL/
RTR4JEYI
December 28, 2014
Man poses in front of on a display showing the word 'cyber' in binary code, in this picture illustration...
Zenica, Bosnia and Herzegovina
Man poses in front of on a display showing the word 'cyber' in binary code, in this picture illustration...
Man poses in front of on a display showing the word 'cyber' in binary code, in this picture illustration taken in Zenica December 27, 2014. A previously undisclosed hacking campaign against military targets in Israel and Europe is probably backed by a country that misused security-testing software to cover its tracks and enhance its capability, researchers said. Picture taken December 27, 2014. REUTERS/Dado Ruvic (BOSNIA AND HERZEGOVINA - Tags: SCIENCE TECHNOLOGY CRIME LAW TPX IMAGES OF THE DAY)
SONY-CYBERSECURITY/THEATERS
RTR4IFVG
December 17, 2014
A signage is seen posted on the box office window at the Sunshine Cinema in New York December 17, 2014....
New York, UNITED STATES
Signage is seen posted on the box office window at the Sunshine Cinema in New York
A signage is seen posted on the box office window at the Sunshine Cinema in New York December 17, 2014. The New York premiere of "The Interview", a Sony Pictures comedy about the assassination of North Korean President Kim Jong-Un, has been canceled and a source said one theatre chain had scrapped plans to show it, after threats from a hacking group. REUTERS/Andrew Kelly (UNITED STATES - Tags: ENTERTAINMENT SOCIETY)
SWEDEN-THAILAND/CYBERCRIME
RTR4CWJI
November 05, 2014
Hans Fredrik Lennart Neij (C), a co-founder of the Swedish file-sharing website, The Pirate Bay, is escorted...
Bangkok, Thailand
Hans Fredrik Lennart Neij, a co-founder of the Swedish file-sharing website, The Pirate Bay, is escorted...
Hans Fredrik Lennart Neij (C), a co-founder of the Swedish file-sharing website, The Pirate Bay, is escorted by Thai police officers as he arrives at the Immigration Detention Center in Bangkok November 5, 2014. Neij, who is known in hacking communities as "TiAmo", has been arrested in Thailand, police said on Tuesday, after he tried to cross into the country from neighbouring Laos. REUTERS/Chaiwat Subprasom (THAILAND - Tags: SOCIETY CRIME LAW)
Technology
Technology
Black Hat USA - 07 Aug 2014
20 PICTURES
Highlight Edit
Highlight Edit
Best of Snowden - 07 Aug 2014
23 PICTURES
Edward Snowden
Edward Snowden
Top Pictures - 07 Aug 2014
41 PICTURES
Technology
Technology
Cyber Security - 07 Aug 2014
59 PICTURES
CYBERSECURITY-HACKING/
RTR41HX3
August 06, 2014
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker...
Las Vegas, UNITED STATES
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker...
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS)
Sort by
Display
Items per page
Page
of 3