It can’t be easy to design computer games for the very paranoid. At various points while trying out the U.K. Cyber Security Challenge games, which were designed to identify and train cybersecurity professionals, I managed to convince...Show More Summary
The weak link is often not the software you use to store your files; it’s you and your policies (or lack of policies) for accessing files.
By Eben Kaplan The United States has a new cybersecurity regulator and it’s the Federal Trade Commission (FTC). If you missed the announcement, that’s because there was none. The FTC was not bestowed these new powers by an act of Congress nor by executive order from the White House, but rather [...]
Before it adjourned in August, Congress delayed a vote on the controversial and dangerous Cybersecurity Information Sharing Act. This is definitely for the best—CISA is deeply flawed legislation that would do more to put citizens’ private data in the hands of the government than to actually make progress on critical cybersecurity issues. Show More Summary
Cybersecurity firm Palo Alto Networks has identified new malware, which it calls YiSpecter, that infects iOS devices by abusing private APIs. Most affected users live in China and Taiwan. Read More
In the span of one year, the Pentagon only managed to address fewer than half of the cybersecurity recommendations to secure vulnerabilities pointed out by its inspector general's office.
Dianne Feinstein says it's time for the internet to stop fighting CISA.
Ah, the Internet of Things. Just the sound of it sends thrills, chills and huge question marks through both technologists and regular people alike. Just think, you can already do the following: Track your health. Track your kids. Track your home. Show More Summary
Today the Department of Defense announced that it will soon require all of its contractors to report any major cybersecurity breaches. And if your first question is, why in the hell didn’t they require that before?, that’s a great question. Read more...
His ticket? Personal privacy... and digital freedom, for all Americans. Call it the “Cyber Party”. Like him or not, McAfee is good for the election because he is going to force the action around cybersecurity. Our nation is at risk for cyber-warfare. Our corporations are at risk for cyber-espionage and digital [...]
A machine classification system can identify harmful website links on Twitter within seconds of being clicked
Cybersecurity remains one of the largest concerns for many of today’s largest institutions. Hackers have become more prevalent than ever and are always finding new ways around the latest internet security precautions. There are many different kinds of information that these hackers seek. Show More Summary
The UK government and Cyber Security Challenge UK have launched a new 3D video game platform that’s aiming to seek out the next generation of cybersecurity geniuses. Funded by the Cabinet Office, the browser-based MMO game asks anyone who’s interested to participate by cracking codes and completing security-related challenges. Show More Summary
The US doesn’t have a problem punishing foreign hackers. The government killed an ISIS hacker with a drone in August. It quickly sanctioned North Korea following the Sony hack. So why hasn’t the United States retaliated against the OPM hackers? More »
You can't trust treaties to look after your cybersecurity, says Hal Hodson – organisations must protect their own data
The US doesn’t have a problem punishing foreign hackers. The government killed an ISIS hacker with a drone in August. It quickly sanctioned North Korea following the Sony hack. So why hasn’t the United States retaliated against the OPM hackers? Read more...
by Angela Guess A recent article out of ARC Advisory group reports, “The Internet of Things Security Foundation (IoTSF) has officially launched and set out its plans to respond to rising concerns surrounding cybersecurity challenges in IoT. Show More Summary
As Chinese President Xi Jinping returns home from Washington, a cybersecurity “understanding” has been announced between China and the United States. Unfortunately, it’s unclear whether the understanding would have prevented cybershenanigans such as the likely Chinese copying of more than 21 million records from the U.S. Show More Summary
The US Congress, faced with a possible government shutdown, is allegedly considering the re-introduction of the Cybersecurity Information Sharing Act (CISA) this week.
The U.S. Department of Homeland Security (DHS) has selected Raytheon Company to be the prime contractor and systems integrator for the agency’s Network Security Deployment (NSD) Division. NSD is responsible for the National Cybersecurity...Show More Summary