It’s a foregone conclusion that app makers will get at least some data on how you use their product. How much data do you really expect, though? Maybe which buttons you tap or the length of sessions? According to TechCrunch and analytics company App Analyst, some popular iPhone apps are getting much more. They basically see everything you do in real time, even sensitive information like passwords and credit card numbers.
China and Russia are likely building high-powered lasers that can shoot down US satellites, according to a new Pentagon report. Both countries are developing an arsenal of anti-satellite weaponry including missiles, cyber attacks, and "directed energy weapons," according to the US Defense Intelligence Agency.
The iCloud security feature has likely cut down on the number of iPhones that have been stolen, but enterprising criminals have found ways to remove iCloud in order to resell devices. To do this, they phish the phone’s original owners, or scam employees at Apple Stores, which have the ability to override iCloud locks. Thieves, coders, and hackers participate in an underground industry designed to remove a user’s iCloud account from a phone so that they can then be resold.
Senior U.S. officials and experts say the United States needs to rally allies to pressure China to prevent it from stealing advanced technology through cyber espionage. At the same time, key American lawmakers are questioning the readiness and capacity of the U.S. to counter such threats.
I used to think we didn’t have enough strategic documents guiding U.S. cyber policy. Now I think we have at least one too many. In September, the Trump administration published a National Cyber Strategy--proudly declaring that it was the first fully articulated cyber strategy in 15 years. This week, the annual intelligence threat hearing laid bare the fantasy world of that four-month-old document and the cold hard reality of, well, reality.
Lawmakers fear that increased threats from foreign actors, combined with lingering effects from the government shutdown, are making the U.S. more susceptible to cyberattacks. The Department of Homeland Security (DHS) issued its first-ever emergency directive during the record-long shutdown, requiring federal agencies to secure certain systems after researchers found Iranian actors were trying to penetrate U.S. government networks.
The United States is facing a wave of new threats from abroad. Unlike in previous decades, some of the most serious of these threats are cyber-related. On Tuesday, Director of National Intelligence Daniel Coats released the intelligence community’s annual Worldwide Threat Assessment, which identifies and evaluates these various threats to the nation.
Two weeks ago the Collection #1 data dump redefined 'big' as far as breached data goes: more than 770 million account details were in that database, made public for all to see. Now big has just got even bigger with the discovery of Collection 2-5 that takes the total number of hacked user accounts published to an astonishing 2.2 billion. As the name suggests, these are databases number 2 to 5 that have followed the first of the Collection breach dumps.
Independent schools and small districts rely heavily on technology to supplement smaller budgets and staffs, which means it is essential to have airtight cybersecurity measures in place. In order to create the best possible defense systems, schools should build on their technology investments over time, according to education leaders at a Jan. 27 session at the Future of Education Technology Conference.
A new report is urging the Trump administration to take action against a pair of Chinese telecommunication giants over the firms’ alleged misconduct, including claims that they work on behalf of the Chinese state government. “Huawei and ZTE represent a serious, long-term national security threat to the U.S. that expands exponentially with the advent of 5G,” reads the report released from researchers at The National Security Institute (NSI) housed within George Mason’s Antonin Scalia Law School.