Despite pleas from unions, our elected leaders happily agreed. Both Republicans and Democrats signed up for NAFTA and, later, China’s entry into the World Trade Organization. But all did not go well. From steel plants in Ohio to furniture factories in North Carolina, American companies suddenly found themselves competing against Chinese labor that paid a few pennies to each of Joe Six Pack’s dollars.
From W-2 scams to WordPress vulnerabilities, ransomware, business email compromises, DDos attacks and allegations of a hacked presidential election -- 2016's been a hell of a year in cybersecurity, and it's not over yet. There's no reason to believe 2017 will be any better.
The panel of security experts pointed out that cybersecurity should become a priority during Donald Trump’s tenure at the helm of the United States, and recommended the President-elect not only to train hackers and be prepared for any cyber threat but also to propose international norms for hacking that would guarantee better protection.
The release of the 100-page report follows the worst hacking of U.S. government systems in history and accusations by the Obama administration that Russia meddled in the U.S. presidential election by hacking Democrats. The Presidential Commission on Enhancing National Cybersecurity urged immediate action within two to five years and suggested the Trump administration consider acting on some proposals within its first 100 days.
Wednesday, the National Science Foundation (NSF) announced $76 million in research grants through its Secure and Trustworthy Cyberspace (SaTC) program to study the scientific, engineering and socio-technical aspects of cybersecurity. The grants support 241 projects across 36 states and 129 institutions, and touch on all aspects of the field.
Because many cybersecurity tasks are performed remotely, "It's appropriate to be engaged in the same types of mediums that professionals would use," he says. When starting an online cybersecurity degree program, prospective students should expect different types of coursework and assessments, from writing to programming, depending on the class and professor - just like on campus.
While some Republican committee members questioned the need for IoT security regulations, Schneier suggested that sellers and customers of IoT devices have little reason to fix them without a push. Many IoT devices are low-profit products with little security built in, no easy avenue to patch vulnerabilities, and no way for customers to know their devices are compromised, he and other experts said.
The head of the National Highway Traffic Safety Administration (NHTSA) stressed to lawmakers on Tuesday that while fully autonomous cars are much further down the road, officials are working hard on cybersecurity concerns and creating a unified regulatory framework before they arrive.
The Obama administration urged tech companies to make millions of devices safe from hacking, underscoring the risks posed by an increasingly bewildering array of internet-connected products permeating daily life, covering everything from fitness trackers to computers in automobiles.
A cybersecurity research firm says “several” models of Android mobile phones forward users' personal information to a Chinese company. Kryptowire discovered the security issue in Android devices using a commercial firmware updating service run by Adups Technology.