Two weeks ago the Collection #1 data dump redefined 'big' as far as breached data goes: more than 770 million account details were in that database, made public for all to see. Now big has just got even bigger with the discovery of Collection 2-5 that takes the total number of hacked user accounts published to an astonishing 2.2 billion. As the name suggests, these are databases number 2 to 5 that have followed the first of the Collection breach dumps.
Independent schools and small districts rely heavily on technology to supplement smaller budgets and staffs, which means it is essential to have airtight cybersecurity measures in place. In order to create the best possible defense systems, schools should build on their technology investments over time, according to education leaders at a Jan. 27 session at the Future of Education Technology Conference.
A new report is urging the Trump administration to take action against a pair of Chinese telecommunication giants over the firms’ alleged misconduct, including claims that they work on behalf of the Chinese state government. “Huawei and ZTE represent a serious, long-term national security threat to the U.S. that expands exponentially with the advent of 5G,” reads the report released from researchers at The National Security Institute (NSI) housed within George Mason’s Antonin Scalia Law School.
Amid a rise in Chinese cyber-theft and the huge growth in the numbers of Chinese exchange students and scholars, officials have stepped up pressure on administrators to take greater precautions to guard against espionage and efforts to steal American technologies and research data.
Transit officials in Washington, D.C., are concerned that their next subway cars might be bugged. Cybersecurity experts wonder: If a state-owned Chinese company wins a contract to supply the city’s Metro system with new cars, might they come with devices installed to surveil U.S. public officials? Metro officials will try to engineer their contract to prevent all this. But why can’t they solve the problem by simply buying American? The answer is this: No U.S. company makes them.
Android has grown over the last decade to become the most popular computing platform on Earth, and it’s an open source project. However, the version of Android you get on most smartphones is bundled with proprietary components, some of which plug into advertising services. It can seem intimidating, but you can gain some semblance of mobile privacy with a few quick tweaks.
Companies globally could incur US$5.2 trillion in additional costs and lost revenue over the next five years due to cyberattacks, as dependency on complex internet-enabled business models outpaces the ability to introduce adequate safeguards that protect critical assets, according to a new report from Accenture.
“Whoever achieves quantum first is going to be able to break all the encryption that’s currently being used,” Hurd says. Right now, data that is encrypted, whether it’s a password, the plans for a new fighter plane, or the names and locations of intelligence officers, can be stolen, but can’t be read unless the thief can break the encryption code. When fully implemented, quantum technology will be able crack those codes, no matter how strong they are.
The National Counterintelligence and Security Center (NCSC) is today disseminating videos, brochures, and other informative materials to help the private sector guard against growing threats from foreign intelligence entities and other adversaries. “Make no mistake, American companies are squarely in the cross-hairs of well-financed nation-state actors, who are routinely breaching private sector networks, stealing proprietary data, and compromising supply chains.
K–12 schools faced serious scrutiny in 2018 as security experts found education institutions had the weakest cybersecurity protections out of 17 vulnerable industries.