Security

Hackers are attacking power companies, stealing critical data: Here's how they are doing it

Attackers are particularly interested in industrial control systems -- and they're still at it right now.<p>Hackers are continuing to attempt to gain …

Cybersecurity

See All 8 Prototypes for Trump’s ‘Big, Beautiful’ Border Wall

The future of President Donald Trump’s promised border wall lies in massive pieces in the California desert.<p>NBC News got an early look at the eight nearly-finished prototypes, assembled near the existing fence along the U.S.-Mexico border miles outside San Diego, ahead of Thursday's deadline for …

Politics

Why Cryptojacking Is The Next Big Cybersecurity Threat

Meet the Internet’s latest menace. Hackers and penny-pinching website hosts are hijacking people’s computers to “mine” cryptocurrency. And we’re not …

Cryptocurrency

The 4 Best Phones for Privacy and Security

Cell phones — particularly smartphones — are inherently bad for privacy. You've basically got a tracking device in your pocket, pinging off cell …

Encryption

What does the WPA2 vulnerability mean for IoT?

Researchers at a Belgian University earlier this week revealed the discovery of a break in the security protocol used to protect the vast majority of Wi-Fi connections (WPA2 based). Mathy Vanhoef of imec-DistriNet, KU Leuven University, released his findings explaining that an attacker within range …

Information Security

How Businesses Are Applying AI to Cybersecurity

In a digital threat landscape where businesses are constantly playing catch-up with new attack vectors and vulnerabilities, the best defense they have is the same thing that makes them such an appealing target for hackers: a mountain of data. Sure, you've got endpoint protection and encryption …

Cybersecurity

FBI chief says inability to access data on encrypted mobile devices is a ‘huge, huge problem’

The FBI has been unable to access data from “more than half” of the devices it has tried to unlock over the past year, according to a new report from The Associated Press. FBI director Christopher Wray made the comment while speaking at a conference over the weekend, acknowledging that there needs …

Privacy

How to prevent your company from getting hacked in 2018

<i>What steps have you taken in 2017 to prevent your company from getting hacked? Do you feel good about the strategy you have in place, or do you feel that you could make some changes for the better? Are you interested in adjusting your approach in 2018?</i><p>Now that 2017 is winding down, it’s time to …

Anti-Virus Software

Crippling crypto weakness opens millions of smartcards to cloning | Ars Technica

Gemalto IDPrime.NET almost certainly isn't the only smartcard vulnerable to ROCA.<p>Millions of smartcards in use by banks and large corporations for …

Information Security

What is good network analysis?

Detection of and protection from advanced cyber-attacks can’t rely on perimeter defense or endpoint agents alone.<p>It’s important to analyse other data …

Cybersecurity

Fancy Bear returns: Russian hackers target US cyber conference with booby-trapped file

Kremlin-linked unit, known as APT28 or Fancy Bear, weaponised a real Word document.<p>In early October, the Russian hacking group, infamous for …

Cybersecurity

Accused Of Spying, A Russian Security Firm Will Show Its Code And Operations To Outsiders

Responding to U.S. government suggestions that its antivirus software has been used for surveillance of customers, Moscow-based Kaspersky Lab is …

National Security Agency (NSA)

Congress is on track for a major government shutdown showdown

Don’t look now, but it’s becoming a real possibility that the government will shut down in December. Congress has until midnight on December 15 to pass a spending bill or the federal government will run out of money.<p>The tricky thing is that Republicans need at least eight Democrats in the Senate to …

U.S. Congress

Third person linked to 2014 iCloud hack that exposed explicit images of dozens of celebrities

A third person has been charged in the iCloud and Gmail hack that exposed explicit photos of dozens of celebrities in 2014. According to Deadline, a Chicago man agreed to plead guilty to hacking over 550 computers, most of which were those of female celebrities…<p>Emilio Herrera signed a plea …

explicit

Security Training Awareness: 3 Big Myths

The once-overwhelming consensus that security awareness programs are invaluable is increasingly up for debate.<p>Organizations of all sizes continue to …

Cybersecurity

Better Security Techniques Leave Passwords In The Dust

Passwords may have protected personal computers since the early days of PCs, but their time may finally be ending. From hardware tokens to facial recognition, endpoint protection is evolving rapidly.<p>Security-conscious organizations are complementing passwords with an extra layer of technology by …

Information Security

A Huge Hole in Wi-Fi Security Leaves Just About Everyone at Risk

This could be the Armageddon of the Internet.<p>By on<p>It’s no overstatement to say the crap could be about to hit the Wi-Fi fan.<p>A widespread, popular …

Wi-Fi

Security Experts: Ongoing FBI, DHS Hack Warnings Of Dire Importance

The United States Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) issued a warning through the U.S. Computer …

Cybersecurity

The great butt plug burglary: £45,000 of dildos stolen in ‘biggest sex toy heist ever’

Thieves have stolen £45,000 of dildos, butt plugs and vibrating love eggs in what is believed to the biggest sex toy heist in history.<p>Brit who …

Booz Allen Hamilton To Acquire Morphick For Managed Cyber Threat Services

Booz Allen Hamilton has agreed to acquire Morphick for an undisclosed amount.<p>Morphick offers a suite of managed cyber threat detection and response …

Business

London Plastic Surgeon to the Stars Victim of Cyber Attack: Could the Royals Be Affected?

One plastic surgery clinic in London has been the victim of an alleged cyber-attack.<p>A spokesperson for London Bridge Plastic Surgery confirms to E! …

Cyber-attacks

New endpoint protection platform guards against nation state attacks

Endpoint security company Endgame is launching its latest platform that measures its effectiveness not just against malware but against nation-state …

Cybersecurity

Anonymous hacks Spanish government websites in 'Free Catalonia' cyber campaign

The group mobilised under #opCatalunya, #FreeCatalonia and #OpSaveCatalonia.<p>Digital activists linked to the Anonymous collective, a disparate cohort …

Cyber-attacks

Wi-Fi hacking is nothing new

Earlier this month, a researcher discovered Wi-Fi has a fundamental security flaw. Again.<p>On October 16, a security researcher in Belgium named Mathy …

Wi-Fi

Have You Seen These Prototypes for Trump's "Ridiculous" Border Wall?

If you haven't yet seen them, a variety of journalists have been getting an up-close look of the prototypes that have been proposed for President …

Liberal View

End of Temporary Protected Status Could Cost Economy Billions, Reports Say

Hundreds of thousands of people living and working legally in the United States — most of them from El Salvador and Honduras — may be forced to return home under a Trump administration that is considering ending their stay here.<p>The Department of Homeland Security is considering whether to extend …

Immigration

Rushing justice is not solution to easing backlogs in immigration courts

Attorney General Jeff Sessions decried the state of the immigration courts in remarks Oct. 12 before the Justice Department’s Executive Office for …

Immigration

How to Get More Sophisticated About Fighting Ransomware

<b>Cybercriminals think just like business leaders do</b>, says Thomas Hansen, chief revenue officer of security vendor Carbon Black. Much like any …

Cybersecurity

7 tips for critical infrastructure network defenders from the FBI and DHS

Here's what infrastructure managers need to know about an alert from Homeland Security and the FBI. The alert includes best practices from the NIST …

Cybersecurity

BAE Systems says it lost 1,000-page Parliament House security manual

Defence contractor, which is on shortlist to win a $35bn navy frigates contract, says mistake will not be repeated<p>BAE Systems Australia – a firm on the shortlist to win a $35bn navy frigates contract – has confirmed it was the contractor that lost a 1,000-page manual on the security upgrade to …