cybersecurity

August 22, 2016

This week (starting August 15), the immediate risk to our lives through cyberblitzkrieg has suddenly risen dramatically, due to new events in cyberspace. If a cyberblitzkrieg on electric power and other critical infrastructure does occur, the level of damage would be comparable in general to the kind of damage we feared at the height of the Cold War, when something like half the world could be lost suddenly and the rest in a cascade of events.

August 10, 2016

Security researchers have identified a complex malware dubbed “ProjectSauron” that hid, undetected, within a number of organizations for five years. Cybersecurity company Kaspersky Lab described ProjectSauron as an extremely sophisticated platform for cyber-espionage Monday. The malware, it added, is designed to conduct “long-term campaigns through stealthy survival mechanisms.”

August 09, 2016

The Obama administration is preparing to elevate the stature of the Pentagon’s Cyber Command, signaling more emphasis on developing cyber weapons to deter attacks, punish intruders into U.S. networks and tackle adversaries such as Islamic State, current and former officials told Reuters. Under the plan being considered at the White House, the officials said, U.S. Cyber Command would become what the military calls a "unified command" equal to combat branches of the military such as the Central and Pacific Commands.

August 08, 2016

Many of the large payment card breaches that hit retail and hospitality businesses in recent years were the result of attackers infecting point-of-sale systems with memory-scraping malware. But there are easier ways to steal this sort of data, due to a lack of authentication and encryption between card readers and the POS payment applications.

August 08, 2016

With the theft and leaking of Democratic National Committee data, dramatic headlines are filling the pages of our newspapers. Calls for action are heard daily. Whatever we might do in direct response, though, the best reaction over the long term might simply be quiet and sustained investment in STEM (science, technology, engineering, mathematics) education.

August 04, 2016

This week, GOP presidential candidate Donald Trump openly speculated that this election would be “rigged.” Last month, Russia decided to take an active role in our election. There’s no basis for questioning the results of a vote that’s still months away. But the interference and aspersions do merit a fresh look at the woeful state of our outdated, insecure electronic voting machines.

July 25, 2016

Over the years there have been two distinct varieties of ransomware which remain consistent: crypto and locker based. Crypto-ransomware is ransomware variants that actually encrypt files and folders, hard drives, etc. Whereas Locker-ransomware only locks users out of their devices, most often seen with Android based ransomware.

July 15, 2016

Fifty-one-year-old Su Bin, owner of Chinese aviation firm Lode-Tech, was sentenced to 46 months in prison for his part in a conspiracy to sell military technical data stolen from U.S. defense firms to state-owned companies in China, according to the Justice Department. Su, a citizen of the People's Republic of China, was sentenced July 13 in a federal court in California.

June 30, 2016

In 2014, a single U.S. government agency was hit with a blizzard of more than 1,370 external attacks on its most vital computer systems, with three out of every eight incidents resulting in a loss of data, according to a new report by the watchdog Government Accountability Office, suggesting hackers have been far more successful at getting at sensitive government information than previously disclosed.

June 28, 2016

The simplest way to prevent ransomware attacks is to regularly backup all of the important contents on your PCs. Dedicated backup software makes full copies of hard disk drives and stores them on some external source, usually a storage drive that is disconnected and purposefully kept offline following backups. Some newer cloud services can also make point-in-time backups that are stored on external servers, and they offer a similar level of protection.

Pages