You are the content you publish.
Sign up with Facebook
Sign up with Twitter
I don't have a Facebook or a Twitter account
Start a free trial of Scoop.it Professional
China launches a crackdown on a cult it says is calling for a "decisive battle" to slay the "Red Dragon" Communist Party.
MIIT gives out a little detail on its plans for app management, but not enough to assuage the fears of Chinese startup mobile developers.
Navigating around the internet in North Korea is a unique experience - but a growing thirst for information could begin to open up the secretive nation.
The state news media confirmed Monday that Xi Jinping, the new Communist Party chief, visited Guangdong Province over the weekend.
The Air Force is beefing up training for its cybersecurity personnel. The resulting new training program may be adopted by other agencies.
In the U.S., we have the people, the talent, and the technology to meet the cyber security threat head on.
It is one thing to have a piece of malware that can focus on targeted attacks, but it is quite another to have it also be nearly invisible. That is just what
Part of the unique beauty of the Internet is that enables every day users to share their views to a worldwide audience and
A report from the Defense Security Service warns that attackers from China, North Korea and other Asian nations are increasing their attempts to acquire sensitive technology, through network attacks, purchasing or other espionage.
New commander-in-chief orders PLA to step up 'real combat' awareness during first reported visits to military bases on tour of Guangdong
With the government's encouragement, Chinese companies have begun what is expected to be a large number of overseas acquisitions.
International spies are becoming increasingly interested in the radiation-hardened microchips used in U.S. spacecraft, according to a new Defense Department report.
BSNL telecom server hacked by Anonymous Group against Section 66A of IT Act
Beijing's new leaders aspire to international greatness. Ordinary Chinese just want access to untainted baby formula.
This year it’s the turn of the e-commerce store Taobao to be scribbled off the naughty list. But there are still plenty of fake items in its stores...
Shhh—defense companies aren't too excited about a new rule that would make them reveal their security breaches.
US Defense Contractors Don't Want to Say When They've Been Hacked by People's Republic of China |
A White House effort to improve the cybersecurity of the nation’s commercial power grid could soon be expanded to other critical sectors, such as transportation and water.
By Andrew Ginter The provisionally-approved CIP V5 standards address a wider spectrum of cyber-security technologies than previous versions addressed. In
Recent cyber attacks have proven that hackers and terrorists are trolling for ways to disrupt national infrastructure. We all recognize the problem, yet no one can agree on a solution.
This fall, the country was hit with a digital pandemic known as the Zeroaccess Botnet. This sophisticated malware actually
Up to 300,000 Chinese civilians and soldiers were killed by the Japanese in 1937.
MIIT is moving to regulate China's app market. But will that be a help or a hindrance to China's app developers.