The Illusion of Online Privacy

As the Ashley Madison hack demonstrated, Web companies can't guarantee privacy. Along with recent high-profile breaches that have affected retailers like Target and government agencies like the IRS and Office of Personnel Management, the Ashley Madison hack shows online information is never truly safe, despite people’s increasing willingness to hand it over.

The U.S. Must Lead on Technology Privacy Issues

Congress and our next president face an increasingly complex and fast-paced security environment. The heightened public debate on these issues underscores the need to update our laws, through measures such as the LEADS Act, and ensure we take advantage of modern ways of exchanging information while respecting longstanding privacy agreements. These issues will have a lasting effect not only in terms of how we treat our citizens’ data, but also in terms of our ability to partner with the rest of the world.

White House Cybersecurity Czar Highlights Escalation Paths for Cyberdefense, Highlights Risk-Management

“A greater and greater percentage of the president’s daily briefings is taken up with cybersecurity threats,” said Michael Daniel, special assistant to the president and cybersecurity coordinator, speaking at the mountain resort here in a question-and-answer session with Alan Raul, a partner and global coordinator for privacy and data security with the law firm of Sidley Austin.

Demand for jobs high in cyber security

"The size of the security threats out there is staggering," said Dandekar, a professor of electrical and computer engineering. "To hear about all of the attacks happening right now, I'd say there's high demand for people with knowledge who can understand these attacks." When Dandekar's students earn their post-graduate degrees in cyber security, they will join one of the nation's fastest-growing occupations, as projected by the U.S. Labor Department's Bureau of Labor Statistics.

Economic Espionage: A Case for Why the U.S. Needs to Push Back

Espionage is nothing new. Indeed, there is a reason that it is referred to as the world’s second-oldest profession. It’s the scale and scope, and the methods and targets of espionage campaigns, that are changing. The FBI reports a significant spike in its number of economic espionage cases: a 53% increase just this past year, according to the Wall Street Journal.

IRS says cyberattacks more extensive than previously thought

The U.S. Internal Revenue Service (IRS) said Monday a hacking attack into one of its computer databases revealed in May was much more extensive than previously thought, with nearly three times as many taxpayers hit by data theft. The IRS said in late May the tax return information of about 114,000 U.S. taxpayers had been illegally accessed by cyber criminals over the preceding four months, with another 111,000 unsuccessful attempts made.

The best of times and worst of times in security education

As a security professional, you may not be aware of all that’s happening in the world of Education Technology (#EdTech) and how it affects the security community. Teachers are using a wide variety of tech tools from smartphones and tablets to Internet applications like Google Docs, Twitter, Edmodo, Udemy, etc. Classrooms are being flipped to be student-focused rather than the traditional ‘sage on the stage’ lecture. The cloud has reached the classroom to where students learn from almost anywhere, anytime from any computing platform.

Chinese cyber espionage group caught hacking defense, industrial base

Though Chinese cyberespionage has been well-documented, researchers from Dell SecureWorks Counter Threat Unit -- a division of Dell tech company -- say this group, nicknamed Emissary Panda by another research firm, has pulled off cyberattacks at a level of sophistication and specialization rarely seen before among Chinese hackers. "In the instances we were able to observe them, they had very specific organizations and projects in mind that they were pursuing...

Innovation and security go hand in hand

The electronic payments industry is innovating at a rapid pace, developing new methods involving cloud-based near field communication (NFC) mobile technology, e-commerce and in-app payment systems, to name a few. All these innovations help make electronic payments easier and more accessible.

The Global Search for Education: Online Educational Tools

"Privacy is of course critical, but at the moment the dialogue nationally is focusing far too much on the privacy aspects surrounding data rather than the important usage data has for driving personalized learning and supporting students, teachers, and parents. If we're not careful, we risk cutting teachers off from critical data that can help them better serve students."

A Rising Tide for Cybersecurity Regulation & Entrepreneurs

As the Securities and Exchange Commission (SEC) emphasizes the importance of including cybersecurity processes and events in a public company’s disclosure of risk factors and material events, young companies are busy bringing to market products and services to improve an organizations’ cyber infrastructure, make encryption easier in file-sharing, help companies detect vulnerable machines on their networks and keep hackers out.

Higher education institutions increasingly falling victim to cyberattacks

Higher education institutions are treasure troves for hackers. Colleges and universities are huge repositories of research data, sensitive information for large populations of applicants and enrolled students (personal, academic, financial and health data), as well as sensitive personal and tax information for all faculty and staff. Higher education information systems are particularly valuable targets for cyberattacks.

Data mining can improve our schools. Will Congress allow it?

In the past, as innovative efforts to use data to improve education began to take shape, those without a clear understanding of the benefits of data mining in education have stopped progress in its tracks, often because of misguided privacy fears. Now, bills introduced in the House and Senate could pave the way for more innovative uses of education data – but the bills simultaneously include provisions that restrict the potential for data-driven improvements to educational outcomes.

U.S. News & World Report Can Hackers Really Target Your Smart Car?

As major automakers continue to roll out cars with Wi-Fi features connecting the vehicles with smartphones and other devices, their innovations are likely to catch the eye of hackers as well as tech-hungry customers, opening up a new asphalt playing field in the arena of cybersecurity. "My concern is where we are heading in the future. As we head toward more automated drive systems, then the possibilities for hacking open up even more," says Akshay Anand, an analyst with automotive research company Kelley Blue Book.

Cyber Security Experts Remotely Hack Into Chrysler Vehicle

Yesterday’s flaws, experts say, are being built directly into tomorrow’s connected world. Among the most vivid examples came this week, when security researchers Charlie Miller and Chris Valasek demonstrated that they could hijack a vehicle over the Internet, without any dealership-installed device to ease access. By hacking into a 2014 Jeep Cherokee, the researchers were able to turn the steering wheel, briefly disable the brakes and shut down the engine.


Contact Us