Chances are you own a smartphone or computer that contains a chip hackers could potentially exploit to get access to sensitive information. That's because billions of devices are affected by two major security flaws revealed by cybersecurity researchers on Wednesday.
As the scourge of ransomware continues unabated, K–12 education increasingly falls victim. As of December, at least 283 U.S. public schools and districts have reported cybersecurity incidents in the nearly two years since January 2016, according to the EdTech Strategies’ K-12 Cyber Incident map.
Facebook Inc and Microsoft Corp disabled a number of North Korean cyber threats last week, a White House official said on Tuesday, as the United States publicly blamed Pyongyang for a May cyber attack that crippled hospitals, banks and other companies.
As we come to the close of 2017, it is increasingly evident that K-12 cybersecurity threats are neither hypothetical, nor imagined. In our rush to embrace technologies for teaching, learning and school operations, we may have made innocent, but ultimately faulty assumptions about the need and effort required to protect digital assets and data.
Digital thieves have a playbook for stealing your sensitive data. A software security firm spells it out. Avira, a company that provides antivirus and Internet security software, has published a concise but informative 5 step guide to mobile theft explaining the how and why of malware getting inside your mobile device.
As reports of cyberattacks multiply--from national election-related hacking to school-level phishing scams--the need for trained high school and postsecondary graduates in the field is growing. And increasingly, industry, governments, and educators are looking to introduce students to online security earlier in their K-12 careers, in the hope of encouraging their continued academic study of the topic and their awareness of careers in the field.
China ranks second only to the United States in terms of internet development and innovation, but among the worst on cybersecurity and industry infrastructure, according to a survey of 38 countries by a Beijing-backed think tank.
“We were used, in the Cold War, to having the current edge in technology, partially because the Russians adopted a policy after World War II to draft off our technology - so they designed their fighters to use F/A-18 radar because they knew they’d be able to steal them,” Lehman said on Wednesday at a Maritime Security Dialogue event cohosted by the U.S. Naval Institute and the Center for Strategic and International Studies.
The White House on Wednesday lifted the veil on the secretive executive branch process used to determine which computer security flaws it can use in surveillance and which it will report to tech firms to allow them to patch. The Trump administration published a first-ever charter for that system, known as the vulnerability equity process (VEP), on Wednesday morning.
The name “Equifax” now sends shivers down our spines. The company we trusted to handle our credit scores has become a pariah of the financial world since it allowed hackers to steal vital information from 145 million American adults.