The Pentagon has long wrapped Diego Garcia in a veil of secrecy, barring media from the Indian Ocean island even as its base and airfield became a key node in America’s wars in the Middle East.
Last month, the Federal Trade Commission and the U.S. Department of Education held a workshop in Washington, DC. The topic was “Student Privacy and Ed Tech.” We at EFF have been trying to get the FTC to focus on the privacy risks of educational technology (or “ed tech”) for over two years, so we eagerly filed formal comments.
To make any real progress in advancing data privacy this year, we have to start doing something about Google and Facebook. Not doing so would be like trying to lose weight without changing your diet. Simply ineffective. The impact these two companies have on our privacy cannot be understated. You may know that hidden trackers lurk on most websites you visit, soaking up your personal information.
In a recent study, 10 percent of simulated phishing e-mails sent to users in education institutions were successful, triggering the recipient to click on a fraudulent link. That's according to the 2018 State of the Phish report from Wombat Security Technologies, in which researchers measured the average click rates on phishing tests across various industries.
The Homeland Security Department plans to update its system for automatically sharing cybersecurity threat information with companies, critical infrastructure providers and other federal agencies this coming summer or fall, a top official said Thursday.
In the three weeks since researchers revealed major flaws in virtually every computer processors, issuing patches has not gone smoothly. "It's been a bit of a disaster," said Ellison Anne Williams, founder and CEO of security firm Enveil. "The problem happens in the memory of the computer. Anytime you start messing with memory, things can go wrong very quickly. Some of the patches coming out do unexpected things. It takes a long time to see how things are going."
A University of Michigan (U-M) team has announced plans to develop an “unhackable” computer, funded by a new $3.6 million grant from the Defense Advanced Research Projects Agency (DARPA). The goal of the project, called MORPHEUS, is to design computers that avoid the vulnerabilities of most current microprocessors, such as the Spectre and Meltdown flaws announced last week.
China’s established practice of intellectual property (IP) theft has contributed significantly to the acceleration of the country’s technical competitiveness, making China one of the US's major cyber threats today. China’s IP theft has occurred across every sector of the U.S. market, and most impactfully against our military defense contractors.
Technology giant Apple has confirmed all iPhones, iPads, Mac computers, and even its Apple TV set-top box had been vulnerable to snooping by hackers as part of two widespread computer chip flaws revealed this week. Only the Apple Watch was safe from attack by one of the security flaws, it revealed today, although software fixes had been issued for others.
Over the past few days we’ve covered major new security risks that struck at a number of modern microprocessors from Intel and to a much lesser extent, ARM and AMD. Information on the attacks and their workarounds initially leaked out slowly, but Google has pushed up its timeline for disclosing the problems and some vendors, like AMD, have issued their own statements. The two flaws in question are known as Spectre and Meltdown, and they both relate to one of the core capabilities of modern CPUs, known as speculative execution.