Outgoing US government has accused Russia of attempting to influence the 2016 election.
At the time of writing, the NCA website kept going offline intermittently.
The threat actors operating the malware appear to be only targeting smartphones with a Russian-language interface.
Blockchain will 'change the culture of the world', says renowned cyber expert
The attack is believed to have lasted for a week, starting in late October and ending on 3 November.
The attack also reportedly affected Republican phone lines.
The agency deployed a network investigative technique, which was designed to grab the real IP addresses of the users.
As the US presidential election approaches, WikiLeaks continues publishing.
A private firm was allegedly hired to conduct an electronic sweep following the DNC hack.
IBTimes UK speaks to The Dark Tangent at Black Hat Europe 2016.
Researchers set to reveal their findings at Black Hat Europe 2016 in London.
The malware has the ability to bypass SMS-based two-factor authentication.
Joint project between industry and law enforcement aims to fight cybercrime.
Previously, several cybersecurity researchers had tied Fancy Bear to the Kremlin and the DNC hack.
'Cyberattacks are a reality and they are happening now,' says Cabinet minister.
The leak appears to consist of a list of servers compromised by NSA hackers.
18-year old Meetkumar Hiteshbhai Desai was arrested for flooding the 911 system with emergency calls.
Hackers leveraged daylight saving to send out spam SMS messages to potential victims.
IBTimes UK talks to security researchers, ex-FBI and ex-NSA cyber experts to find out about deadly threats in cyberspace.
A SQL database backup was "placed in an insecure environment" by a third party.
Pegasus, YiSpecter and Stagefright are all examples of major mobile malware.
Hackers posing as customer support staff on Twitter to hoodwink customers into divulging credentials.