Macron campaign team used honeypot accounts to fake out Fancy Bear
Digital team filled fake accounts with garbage data to slow information operation. Continue reading Macron campaign team used honeypot accounts to fake out Fancy Bear
Collaborate Disseminate
Digital team filled fake accounts with garbage data to slow information operation. Continue reading Macron campaign team used honeypot accounts to fake out Fancy Bear
Russian security firms’ metadata found in files, according to WikiLeaks and others. Continue reading Evidence suggests Russia behind hack of French presidential candidate
A potential threat from spoofing Google applications was cited in 2011. Continue reading Google phishing attack was foretold by researchers—and it may have used their code
Is that a live video feed from a Predator on the Internet? Well, yes and no. Continue reading Not-so-secret DOD “spy drone” footage, live on the Internet
An e-mail disguised as a Google Docs share is ingenious bit of malicious phishing. Continue reading All your Googles are belong to us: Look out for the Google Docs phishing worm
Facebook no longer wants to be a tool for enlisting “useful idiots.” Continue reading Facebook enters war against “information operations,” acknowledges election hijinx
Breach of post-production company poses potential threat to many networks’ shows. Continue reading Hacker leaks Orange is the New Black new season after ransom demands ignored
Breach of post-production company poses potential threat to many networks’ shows. Continue reading Hacker leaks Orange is the New Black new season after ransom demands ignored
Lawsuit: After a sexual harassment claim, Fox News planted spyware on ex-host’s computer. Continue reading Lawsuit: Fox News group hacked, surveilled, and stalked ex-host Andrea Tantaros
Senate employees just use passwords, and their badges sport a picture of an alternative. Continue reading Picture this: Senate staffers’ ID cards have photo of smart chip, no security