The amount of personal data transmitted online is insane. Think about it: whether you're buying something to be delivered to your home or finishing up your taxes, inputting you credit card and personal information on the internet is nearly impossible to avoid — but you can do more to protect it. Show More Summary
Just when you thought you had a grasp of cybersecurity, criminals have found another way to hack your computers: cryptojacking. Tesla recently discovered the problem on its cloud system. The company quickly reported that it did not affect customer privacy or vehicle security. But the breach illustrates another reason......
While some countries struggle with safety, U.S. airplane travel has lately had a remarkable safety record. In fact, from 2014 through 2017, there were no fatal commercial airline crashes in the U.S.
The startup's Series D round highlights investor interest in AI cybersecurity systems.
Updated guidance offers suggestions on how and when public companies should disclose breaches and risks.
Nothing says cutting-edge digital badassery like a government cybersecurity task force, amirite? On Tuesday, Attorney General Jeff Sessions announced the creation of a new, special cybersecurity task force aimed at combatting global threats and protecting U.S. Show More Summary
With the trend of growing cybercrime showing no indication of abating, a startup called Vectra that has built an artificial intelligence-based system called Cognito to detect cyberattacks and mobilise security systems to respond to them has raised $36 million to expand its R&D and business development. Show More Summary
by Angela Guess According to a new press release, “After an extensive two-year process, a joint task force led by the Association for Computing Machinery (ACM) and the IEEE Computer Society (IEEE-CS) has released a first-ever set of global curricular recommendations in cybersecurity education. Show More Summary
Tesla’s Amazon Cloud account was hacked and used to mine cryptocurrency, according to researchers at the cybersecurity company RedLock. The researchers found the hack while investigating an unsecured Amazon Web Services (AWS) account that was accessible on the public internet. The account turned out to be Tesla’s, and Redlock weren’t the first to find it. […]
Vectra, a company that helps enterprises detect cyberattacks by applying machine learning to their network traffic, announced today that it has raised $36 million in series D funding to fuel international expansion. The startup’s software uses machine learning to detect anomalies in a customer’s network traffic metadata and other sources and provide security analysts with […]
Hundreds of hackers have targeted Singapore's defence ministry –- but the attacks were at the government's invitation in an unusual attempt to strengthen cybersecurity.
Cybersecurity firm Vectra Networks Inc. said today it has just raised $36 million in a late-stage round of funding. The company plans to use funds from the Series D round to bolster its marketing efforts and improve its artificial intelligence-powered...Show More Summary
As the technology that powers medical implants grows more and more complex, researchers warn that they could become a prime target for cybersecurity intrusions. A new paper published in the Journal of the American College of Cardiology...Show More Summary
ALM talked with Peter Swire, senior counsel at Alston & Bird and privacy and cybersecurity expert at the Georgia Institute of Technology's Scheller College of Business, about some of the legal and data privacy issues surrounding the new, data-driven health care delivery systems. These include the proposed merger between CVS Health and Aetna... Read the whole entry... »
Much of North Korea's resources are poured into the development of nuclear weapons and cyberespionage.
Tesla's Amazon Web Services account was hacked to mine cryptocurrency. The hack, which was first brought to Tesla's attention by the cybersecurity startup RedLock, also exposed some of Tesla's proprietary data related to mapping, telemetry,...Show More Summary
North Korean hackers are becoming more aggressive than their Chinese counterparts, a leading US cybersecurity firm warned Tuesday, as it identified a Pyongyang-linked group as an "advanced persistent threat". It was the first time that FireEye had used the designation for a North Korean-based group. Show More Summary
Mega cybersecurity breaches have left the public and companies feeling vulnerable, and, according to a new report by cloud security firm RedLock, Tesla is one of the latest victims to have its public cloud breached by hackers. The RedLock CSI team found that hackers infiltrated a public cloud environment owned by the electric car company. […]
Key Russian election infrastructure could be targeted by a cyberattack during the March presidential vote, said the head of the National Security Council in a report on cybersecurity. Read Full Article at RT.com
Government cybersecurity programs usually aim to help big, critical enterprises directly, or improve the cyber awareness of families and consumers. What about all the small and medium businesses?