Home Title Index Topic Index Sources Directory News Releases Sources Calendar RSS Sources Select News RSS Feed

Computer Viruses
AlterLinks Topic Index

  1. Approaching Zero
    Resource Type: Book
    Published: 1993
  2. Computer viruses slow African expansion
    Hampered by pirated software and super-slow download times, computer users in Africa are finding PC viruses hard to eradicate

    Resource Type: Article
    Published: 2009
    Expense of anti-virus software means a majority of African computer's are rife with malware that can brutally cripple the users relying on those systems.
  3. Documents Reveal Canada's Secret Hacking Tactics
    Resource Type: Article
    Published: 2015
    Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show.
  4. Preparing for a Digital 9/11
    Resource Type: Article
    Published: 2012
    In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
  5. Stuxnet on the Loose
    Security for the One Percent

    Resource Type: Article
    Published: 2012
    Suspicions that the Stuxnet computer worm was indeed developed by the United States and Israel has once again exposed American exceptionalism. Espionage and sabotage are presented as intolerable criminal transgressions, normally causing our elected officials and military leaders to erupt in fits of righteous indignation. That is, unless the United States is doing the spying and the sabotaging.
  6. US was 'key player in cyber-attacks on Iran's nuclear programme'
    Obama reported to have approved bid to target Tehran's nuclear efforts

    Resource Type: Article
    Published: 2012
    Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies.
  7. Watch your attachments: Microsoft Office bug lets hackers take over computers
    Resource Type: Article
    Published: 2014
    A dangerous new security vulnerability has been discovered in Microsoft's Office software, threatening to hijack users of virtually every existing version of Windows. The bug in question affects programs like Word, PowerPoint, and Excel – and could allow an intruder to gain access to and control over a user's entire computer.

Sources-journalists use the sources website to find you


© 2019. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.