cybersecurity

February 13, 2019

China and Russia are likely building high-powered lasers that can shoot down US satellites, according to a new Pentagon report. Both countries are developing an arsenal of anti-satellite weaponry including missiles, cyber attacks, and "directed energy weapons," according to the US Defense Intelligence Agency.

February 11, 2019

The iCloud security feature has likely cut down on the number of iPhones that have been stolen, but enterprising criminals have found ways to remove iCloud in order to resell devices. To do this, they phish the phone’s original owners, or scam employees at Apple Stores, which have the ability to override iCloud locks. Thieves, coders, and hackers participate in an underground industry designed to remove a user’s iCloud account from a phone so that they can then be resold.

February 04, 2019

Senior U.S. officials and experts say the United States needs to rally allies to pressure China to prevent it from stealing advanced technology through cyber espionage. At the same time, key American lawmakers are questioning the readiness and capacity of the U.S. to counter such threats.

February 04, 2019

I used to think we didn’t have enough strategic documents guiding U.S. cyber policy. Now I think we have at least one too many. In September, the Trump administration published a National Cyber Strategy--proudly declaring that it was the first fully articulated cyber strategy in 15 years. This week, the annual intelligence threat hearing laid bare the fantasy world of that four-month-old document and the cold hard reality of, well, reality.

February 04, 2019

Lawmakers fear that increased threats from foreign actors, combined with lingering effects from the government shutdown, are making the U.S. more susceptible to cyberattacks. The Department of Homeland Security (DHS) issued its first-ever emergency directive during the record-long shutdown, requiring federal agencies to secure certain systems after researchers found Iranian actors were trying to penetrate U.S. government networks.

February 04, 2019

The United States is facing a wave of new threats from abroad. Unlike in previous decades, some of the most serious of these threats are cyber-related. On Tuesday, Director of National Intelligence Daniel Coats released the intelligence community’s annual Worldwide Threat Assessment, which identifies and evaluates these various threats to the nation.

February 01, 2019

Two weeks ago the Collection #1 data dump redefined 'big' as far as breached data goes: more than 770 million account details were in that database, made public for all to see. Now big has just got even bigger with the discovery of Collection 2-5 that takes the total number of hacked user accounts published to an astonishing 2.2 billion. As the name suggests, these are databases number 2 to 5 that have followed the first of the Collection breach dumps.

January 30, 2019

Independent schools and small districts rely heavily on technology to supplement smaller budgets and staffs, which means it is essential to have airtight cybersecurity measures in place. In order to create the best possible defense systems, schools should build on their technology investments over time, according to education leaders at a Jan. 27 session at the Future of Education Technology Conference.

January 25, 2019

A new report is urging the Trump administration to take action against a pair of Chinese telecommunication giants over the firms’ alleged misconduct, including claims that they work on behalf of the Chinese state government. “Huawei and ZTE represent a serious, long-term national security threat to the U.S. that expands exponentially with the advent of 5G,” reads the report released from researchers at The National Security Institute (NSI) housed within George Mason’s Antonin Scalia Law School.

January 24, 2019

Amid a rise in Chinese cyber-theft and the huge growth in the numbers of Chinese exchange students and scholars, officials have stepped up pressure on administrators to take greater precautions to guard against espionage and efforts to steal American technologies and research data.

Pages