The U.S. response to enemy cyber strikes should be “more than commensurate,” Homeland Security Secretary Kirstjen Nielsen said during an on-stage discussion Wednesday. A Chicago way response model could fall afoul of international rules and norms in some circumstances, however, and risks escalating cyber conflicts rather than deterring them, a top international law scholar told Nextgov.
Many email scams are effective because they’re so straightforward, a new report says. About 60 percent of business email fraud does not involve a malicious link, but rather a plain text message that can be surprisingly effective when wording and context seem authentic, according to a report released Thursday by Barracuda Networks.
With all the focus on Russian hacking, Russian ambition, and Russian threats to U.S. national economic security, another Red Threat continues seemingly unabated: China’s ongoing effort to compete as a global economic power equal to, if not exceeding, the United States. China has the population and the economic ability to compete, and has made its ambitions crystal clear with its Made in China 2025 plans.
On May 27, Justice Department officials asked Americans to reboot their routers to stop the attack. Afterwards, the world largely forgot about it. That’s a mistake, said Rob Joyce, senior advisor to the director of the National Security Agency and the former White House cybersecurity coordinator. “The Russian malware is still there,” said Joyce.
With Sino-American trade tensions escalating, China's cybersecurity standards could be used as an "invisible tool" of retaliation against Washington's tariffs, according to one expert. Those so-called standards are government-issued guidelines about things like firewalls and software that are technically voluntary, but are oftentimes treated as mandatory by foreign firms' Chinese business partners.
With just a simple script and a $40 virtual phone number, a hacker could automatically break into voicemail accounts at scale, and parlay that access into control over online accounts including WhatsApp or PayPal, or even track someone’s every move.
The satellite communications that ships, planes and the military use to connect to the internet are vulnerable to hackers that, in the worst-case scenario, could carry out “cyber-physical attacks”, turning satellite antennas into weapons that operate, essentially, like microwave ovens.
The final version of an annual defense policy bill would set new authorities for the Department of Defense to deter and respond to attacks in cyberspace, including establishing the first U.S. policy on cyber warfare. Following House and Senate negotiations, a conference report on the National Defense Authorization Act (NDAA) released Monday says the United States should be able to use every option on the table, including offensive cyber capabilities.
If there is one single matter that worries tech leaders today it is the difficulty in conciliating innovation and regulation. Most companies, from tech giants to startups, are still trying to adjust to the EU's General Data Protection Regulation (GDPR), and yet more of the same is coming. The next step will be the adoption of the EU’s ePrivacy Regulation, which will be published toward the end of 2018 or early 2019.
A new system can look at a person’s finger making a motion in the air--like a signature or drawing a shape--to authenticate their identity. The framework, called FMCode, employs algorithms fed by a wearable sensor or camera, and can correctly identify users between 94.3% to 96.7% of the time on two different gesture devices after only seeing the passcode a few times, researchers say.