4 Nov 2016

UK Unveils New Cybersecurity Strategy

UK Unveils New Cybersecurity Strategy http://ift.tt/2fCzxtm

Cyber Threats – Strategic and Operational Risks

Cyber Threats – Strategic and Operational Risks http://ift.tt/2f8rNuM

Leaked Xinjiang Police Report Describes Circumvention Tools as ‘Terrorist Software’

Leaked Xinjiang Police Report Describes Circumvention Tools as ‘Terrorist Software’ http://ift.tt/2fjzOjw

Cybersecurity Law (Draft) (3rd Reading Draft) Translation

Cybersecurity Law (Draft) (3rd Reading Draft) Translation http://ift.tt/2f8qNXI

This Is How Quantum Computing Will Change The World

This Is How Quantum Computing Will Change The World http://ift.tt/2fjyahW

Inside The Ukrainian ‘Hacktivist’ Network Cyberbattling The Kremlin

Inside The Ukrainian ‘Hacktivist’ Network Cyberbattling The Kremlin http://ift.tt/2f8sq7D

New IoT Linux IRCTelnet Botnet Wreaks Havoc

New IoT Linux IRCTelnet Botnet Wreaks Havoc http://ift.tt/2fjCfCA

The world’s best cyber army doesn’t belong to Russia

The world’s best cyber army doesn’t belong to Russia http://ift.tt/2flR2ee

Hackers Providing Services to Militant Groups for Employment

Hackers Providing Services to Militant Groups for Employment http://ift.tt/2f13mSB

John Brennan’s attempt to lead America’s spies into the age of cyberwar

John Brennan’s attempt to lead America’s spies into the age of cyberwar http://ift.tt/2flNJnc