Senior U.S. officials and experts say the United States needs to rally allies to pressure China to prevent it from stealing advanced technology through cyber espionage. At the same time, key American lawmakers are questioning the readiness and capacity of the U.S. to counter such threats.
I used to think we didn’t have enough strategic documents guiding U.S. cyber policy. Now I think we have at least one too many. In September, the Trump administration published a National Cyber Strategy--proudly declaring that it was the first fully articulated cyber strategy in 15 years. This week, the annual intelligence threat hearing laid bare the fantasy world of that four-month-old document and the cold hard reality of, well, reality.
Lawmakers fear that increased threats from foreign actors, combined with lingering effects from the government shutdown, are making the U.S. more susceptible to cyberattacks. The Department of Homeland Security (DHS) issued its first-ever emergency directive during the record-long shutdown, requiring federal agencies to secure certain systems after researchers found Iranian actors were trying to penetrate U.S. government networks.
The United States is facing a wave of new threats from abroad. Unlike in previous decades, some of the most serious of these threats are cyber-related. On Tuesday, Director of National Intelligence Daniel Coats released the intelligence community’s annual Worldwide Threat Assessment, which identifies and evaluates these various threats to the nation.
Two weeks ago the Collection #1 data dump redefined 'big' as far as breached data goes: more than 770 million account details were in that database, made public for all to see. Now big has just got even bigger with the discovery of Collection 2-5 that takes the total number of hacked user accounts published to an astonishing 2.2 billion. As the name suggests, these are databases number 2 to 5 that have followed the first of the Collection breach dumps.
Independent schools and small districts rely heavily on technology to supplement smaller budgets and staffs, which means it is essential to have airtight cybersecurity measures in place. In order to create the best possible defense systems, schools should build on their technology investments over time, according to education leaders at a Jan. 27 session at the Future of Education Technology Conference.
A new report is urging the Trump administration to take action against a pair of Chinese telecommunication giants over the firms’ alleged misconduct, including claims that they work on behalf of the Chinese state government. “Huawei and ZTE represent a serious, long-term national security threat to the U.S. that expands exponentially with the advent of 5G,” reads the report released from researchers at The National Security Institute (NSI) housed within George Mason’s Antonin Scalia Law School.
Amid a rise in Chinese cyber-theft and the huge growth in the numbers of Chinese exchange students and scholars, officials have stepped up pressure on administrators to take greater precautions to guard against espionage and efforts to steal American technologies and research data.
Transit officials in Washington, D.C., are concerned that their next subway cars might be bugged. Cybersecurity experts wonder: If a state-owned Chinese company wins a contract to supply the city’s Metro system with new cars, might they come with devices installed to surveil U.S. public officials? Metro officials will try to engineer their contract to prevent all this. But why can’t they solve the problem by simply buying American? The answer is this: No U.S. company makes them.
Android has grown over the last decade to become the most popular computing platform on Earth, and it’s an open source project. However, the version of Android you get on most smartphones is bundled with proprietary components, some of which plug into advertising services. It can seem intimidating, but you can gain some semblance of mobile privacy with a few quick tweaks.