66.6 F
Washington, D.C.
Tuesday, September 26, 2017

Deloitte Targeted by Hackers: Confidential Information Likely Accessed

Cybersecurity

hacker  Security hacker 324x235

Hackers Exploit Vulnerability in SEC’s filing System

The Securities and Exchange Commission (SEC) said Wednesday that hackers accessed the Commission’s EDGAR test filing system in 2016, and may have provided the basis for illicit gain through trading. Specifically, a software vulnerability in the test filing component of...
cyber  Security cyber intrusions 324x235

U.S. Army Study Demonstrates Cyber Intrusions are Predictable

A new study from the U.S. Army Research Laboratory presents evidence that the number of cyber intrusions can be predicted, particularly when analysts are already observing activities on a company or government organization's computer network. Researchers say new models that...
kaspersky  Security kaspersky1 324x235

Senate Votes to Ban Kaspersky Lab Products From Government Networks

The U.S. Senate on Monday passed an amendment against Kaspersky Lab pushed forward by New Hampshire Democrat Jeanne Shaheen. The amendment bans the use of Kaspersky Lab software across the federal government, and passed the Senate as part of...
Security data9 324x235

Congressman Reintroduces the Personal Data Notification and Protection Act

Following the Equifax data breach, Congressman Jim Langevin (D-RI), co-founder and co-chair of the Congressional Cybersecurity Caucus, reintroduced the Personal Data Notification and Protection Act, which provides for a single national breach notification standard. The bill requires that companies notify...
Security northam 324x235

Northrop Grumman to Acquire Orbital ATK for $7.8 Billion

Northrop Grumman Corporation, a leading global security company, and Orbital ATK, Inc., a global leader in aerospace and defense technologies, said Monday they have entered into a definitive agreement under which Northrop Grumman will acquire Orbital ATK for approximately...
data  Security data7 324x235

Misconfigured Database Containing Data of 593,328 Alaska Voters Exposed Online

A misconfigured database that contained info for 593,328 Alaska voters was exposed online according to the Kromtech Security Center which discovered the records. The records contained the contact and voting information of over 191 million voters, and 58 million unregistered,...
Security credit freeze 324x235

Legislator Introduces Bill to Provide Americans With Free Credit Protections

U.S. Sen. Ron Wyden, D-Ore., on Thursday introduced legislation to allow Americans to protect themselves from financial fraud at no cost. This is response to reports that millions of Americans’ personally identifiable and credit card information was exposed in...
Security credit4 324x235

Attorneys General Around the Country Ask Equifax to Disable Fee-Based Monitoring Services

Connecticut’s attorney general, and others investigating Equifax Inc’s data breach on Friday asked the company to disable links for enrollment in fee-based credit monitoring service in the wake of the massive data breach impacting 143 million people. Connecticut is co-leading...
fct  Security fct 324x235

FTC Warns of Phishing Scams Related to Equifax Breach

The Federal Trade Commission (FTC) has released an alert on scams related to the Equifax data breach. FTC warns consumers to be wary of calls or emails purporting to be from Equifax agents. Legitimate Equifax representatives will not contact...
iphonex  Security iphonexs 324x235

Vendors Already Selling Face Masks to Protect Users From iPhone X’s Facial Recognition

It begs the question of why you have to use a product if you have to go to somewhat extreme lengths to protect yourself from certain technology in the product, but prospective users of iPhone X can already purchase...
iphone x  Security iphone x 324x235

Legislator Raises Privacy and Security Concerns Regarding iPhone X’s ‘Face ID’ Technology

U.S. Sen. Al Franken on Wednesday wrote a letter to Apple CEO Tim Cook asking him to explain to the American public how the newest iPhone's addition of "Face ID" technology-a facial recognition tool that allows users to unlock...
Security blumenthal 324x235

Legislators Introduce Bill Tasking Credit Report Companies With Greater Accountability

Senators Richard Blumenthal (D-Conn.), Edward J. Markey (D-Mass,), Sheldon Whitehouse (D-R.I.) and Al Franken (D-Minn.) introduced legislation on Thursday to require accountability and transparency for data brokers like Equifax who are collecting and selling personal and sensitive information about...
shopper  Security shopper 324x235

FTC Fines Online Marketers More Than $2.5 Million Over Fake ‘Free’ and ‘Risk-Free’ Trials

A group of online marketers will pay more than $2.5 million to settle Federal Trade Commission charges that they deceived consumers with “free” and “risk-free” trials for cooking and golfing products. According to an FTC complaint filed in March 2017,...
breach  Security breach7 324x235

Equifax Blames Data Breach on Website Application Vulnerability; Stock Plummets

Equifax is paying the price for the carelessness which allowed criminals to gain access to the personal information of more than 143 million Americans. It is currently faced with a massive class action lawsuit, has spurred debate on its...
check  Security background check 324x235

Defense Department to Create Federal-Wide National Background Investigation Service

The US Government has announced plans to create a national background investigation system. The federal government is required to vet individuals as trustworthy. Once vetted, this need continues to ensure the individuals remain trustworthy for as long as they...
hack  Security hack7 324x235

Zerodium Offers $1 Million in Bug Bounty for Tor Browser Zero-Day Exploits

ZERODIUM, a zero-day acquisition platform, announced on Wednesday that it is hosting a Tor Browser Zero-Day Bounty. ZERODIUM will pay a total of one million U.S. dollars ($1,000,000) in rewards to acquire zero-day exploits for Tor Browser on Tails...
Security breach1 324x235

Legislators Request Information on Equifax Breach, Say Incident Most Costly Yet

Senate Finance Committee Chairman Orrin Hatch (R-Utah) and Ranking Member Ron Wyden (D-Ore.) on Monday called on Equifax Inc., to respond to reports that the firm experienced a data breach exposing personally identifiable information such as Social Security numbers,...
dhs  Security dhs 324x235

Kaspersky Responds to Ban of Products and Services by DHS, Calls it ‘Dissapointing’

The Department of Homeland Security (DHS) on Wednesday banned agencies and Federal Executive Departments from the use of Kaspersky Lab- related products and services. According to the DHS, this is based what the agency referred to as the ties between...
kaspersky  Security kaspersky1 324x235

DHS Directs Agencies to Purge Kaspersky Products From US Information Systems

Acting Secretary of Homeland Security Elaine Duke on Wednesday issued a Binding Operational Directive (BOD) directing Federal Executive Branch departments and agencies to take actions related to the use or presence of information security products, solutions, and services supplied...
DNI Head Daniel Coates  Security 001 billington cybersecurity immediate release credit nathan mitchell 324x235

Cybersecurity a Top Priority for Director of National Intelligence, Intelligence Community

U.S. Director of National Intelligence Daniel Coats has described the ever-expanding list of cyber threats from across the world as a top priority for his office and the intelligence community. “It’s clear that cybersecurity has become one of the most...
breach  Security data security breach 324x235

Massachusetts’s AG to Sue Equifax Over ‘Brazen Failure to Protect Consumer Data’

Massachusetts's attorney general on Tuesday said the state intends to sue credit reporting firm Equifax Inc. over its failure to protect sensitive and personal information of up to nearly three million Massachusetts residents. “In all of our years investigating data...
Security analytics8 324x235

Data Artisans Unveils Open Source Apache Flink Stream Processing Platform

Data Artisans, founded by the original creators of Apache Flink, on Monday announced dA Platform 2, the next generation of its enterprise stream processing platform. Featuring the Application Manager, the new release productionizes stream processing and enables companies to...
cyber  Security cyber defense 324x235

United States, Finland Conduct Bilateral Cyber Defense Exercise

Finland and the United States will conduct the bilateral cyber defense exercise Cyber Lightning in Finland on 11-15 September 2017. The goal of the exercise is to recognize common cooperation possibilities and operating procedures in the cyber environment. The exercise will...
Security att1 324x235

AT&T, Microsoft Partner to Deploy Cloud-Based IoT Management Tool for Enterprises

AT&T said Monday it is partnering with Microsoft to debut an IoT solution for quick deployment of asset monitoring and management solutions in the Cloud. The new IoT solution called AT&T Asset Management – Operations Center, will be run on...
smart grid  Security grid 324x235

Energy Department Awards Funds to Improve Security of Nation’s Vital Energy Infrastructure

The Department of Energy (DOE) on Tuesday announced awards of up to $50 million to DOE’s National Laboratories to support early stage research and development of next-generation tools and technologies to further improve the resilience of the Nation's critical...
blockchain  Security blockchain7 324x235

R3 Collaborates With UK Regulator and Banks on Blockchain-Based Mortgage Reporting

Enterprise software firm R3 said Tuesday it has collaborated with the Financial Conduct Authority (FCA), RBS and another major global bank to build a prototype application for regulatory reporting of mortgage transactions on R3’s Corda distributed ledger technology (DLT)...
Security facebook 1 324x235

Spanish Data Watchdog Fines Facebook 1.2 Million Euros for Violating Privacy Laws

Spanish data protection agency, AEPD, has fined Facebook 1.2 million euros ($1.4 million) for the unauthorized collection of the personal information of users in Spain. This information could be used to target the users with advertising, the watchdog alleged. According...
phone  Security phone5 324x235

T-Mobile, AT&T, Verizon & Sprint Form ‘Mobile Authentication Taskforce’

AT&T, Sprint, T-Mobile and Verizon said Friday they are joining forces and resources to develop a more secure solution for two-factor authentication through the creation of the Mobile Authentication Taskforce. The mission of this taskforce is to develop a...
Security blockchain insurance 324x235

Maersk and Partners to Deploy ‘World’s First’ Blockchain Platform for Marine Insurance Sector

Consultancy EY said on Wednesday it is set to deploy the “world’s first blockchain platform for the marine sector,” in collaboration with data security firm Guardtime, Microsoft and ship operator Maersk . The blockchain platform is built on Microsoft Azure...
grid  Security grid6 324x235

Cyber Attacks Target US, European Energy Sectors – Symantec

Security researchers Symantec report that the North American and European energy sectors are being targeted by what it describes as “a new wave of cyberattacks that could provide attackers with the means to severely disrupt affected operations.” According to the...
Security data breach2 324x235

Massive Cyber Breach at Equifax Has Dire Consequences for 143 Million Customers

Credit reporting agency Equifax on Thursday announced a cybersecurity incident potentially impacting approximately 143 million U.S. consumers. According to Equifax, Criminals exploited a U.S. website application vulnerability to gain access to “certain files.” These “certain files” include personal data of...
cybersecurity  Security cyber22 324x235

NIST Publishes Cybersecurity Workforce Framework

The National Institute of Standards and Technology’s (NIST) National Initiative for Cybersecurity Education (NICE) has published Special Publication 800-181, the NICE Cybersecurity Workforce Framework, aimed at helping organizations select a workforce capable of meeting their cybersecurity needs. The publication serves...
Security african american 324x235

IBM, Sony Partner on Blockchain-Based Education Data Management System

IBM said Wednesday that Sony Corporation and Sony Global Education, a subsidiary of Sony that works to provide global educational services, have developed a new blockchain-based student education records platform. With the solution, school administrators can consolidate and manage students'...
microsoft  Security microsoft 324x235

Microsoft Announces CoCo Framework to Advance Enterprise Adoption of Blockchain Tech

Microsoft Corp. on Thursday announced the Coco Framework, "a first-of-its-kind innovation" that will advance enterprise adoption of blockchain technology. Current blockchain protocol technology requires complicated development techniques to meet the operational and security needs of enterprises. The Coco Framework reduces...
drone  Security drone4 324x235

Lawmakers Introduce Bill to Protect Aircraft from Drones

U.S. Representative Jim Langevin (D-RI) and Senator Sheldon Whitehouse (D-RI) last week introduced the Drone Operator Safety Act, a bill to help protect American air traffic from the misuse of drones. The bill would make it a criminal offense to...
Security autonomous4 2 324x235

UK Government Issues Cybersecurity Guidance for Autonomous Vehicles

The British government has unveiled new government guidance which it says will ensure engineers developing smart vehicles will apply tougher cyber protections in their designs to help combat hacking. The government is also looking at a broader program of...
Security border wall 324x235

Hurd Introduces Smart Wall Legislation

U.S. Representative Will Hurd (R-TX) last week introduced the Secure Miles with All Resources and Technology (SMART) Act. Representatives Henry Cuellar (D-TX), David G. Valadao (R-CA), Steve Knight (R-CA), Steve Pearce (R-NM), Brian Fitzpatrick (R-PA), and Keith Rothfus...
Security breach1 324x235

Justice Department Releases Framework to Help Organizations Design Bug Bounty Programs

The Justice Department has released guidelines to help organizations design bug bounty programs. The Criminal Division’s Cybersecurity Unit has prepared this framework to assist organizations interested in instituting a formal vulnerability disclosure program. It provides a rubric of considerations...
hacker  Security hacker 324x235

Hackers Claim Credit for Data Leak From Alleged Breach of FireEye’s Mandiant

Multiple reports have it that a set of systems operated by Adi Peretz, a Senior Threat Intelligence Analyst at at Mandiant, a subsidiary of cybersecurity firm FireEye, was apparently compromised by hackers, exposing sensitive data. The hackers hinted at the...
Security breach1 324x235

Report: Data Breach Exposes ‘Close to 4 Million’ Dow Jones Customer Accounts

Cybersecurity firm UpGuard reported Monday that a cloud-based file repository owned by financial publishing firm Dow Jones & Company, which had been configured to allow semi-public access exposed the sensitive personal and financial details of millions of the company’s...
net neutrality  Security net neutrality1 324x235

Tech Firms Urge FCC to Shelve Plans to Reverse Net Neutrality Rules

The Internet Association, a group representing major tech firms including Facebook, Google, Microsoft and Amazon, on Monday urged the U.S. Federal Communications Commission (FCC) to end plans to reverse 2015 rules prohibiting ISPs from manipulating the speed of consumers...
Security fedex 324x235

FedEx Discloses Petya Cyberattack on TNT Systems Will Have ‘Financial Consequences’

Courier company FedEx Corp said Monday the recent Petya cyberattack will “negatively impact” its revenue as the company struggles to recover from the consequences of the attack. The company made this disclosure in its annual report on Form 10-K...
blockchain  Security hyper 324x235

Hyperledger Releases Hyperledger Fabric 1.0, Open Source Blockchain Framework

Hyperledger, a collaborative cross-industry effort created to advance blockchain technology, announced on Tuesday the general availability of Hyperledger Fabric 1.0. Hosted by The Linux Foundation, Hyperledger Fabric is a blockchain framework implementation and intended as a foundation for developing...
cyber  Security cyber9 324x235

Senators Introduce Legislation to Combat Cybercrime

A bipartisan pair of senators on Thursday introduced legislation aimed at combating cybercrime against U.S. computer networks. Congresswoman Anna Eshoo (D-CA), Senator Orrin Hatch (R-UT), Senator Ed Markey (D-MA) and Congresswoman Susan Brooks (R-IN) introduced legislation to combat cyberattacks...
airplane  Security airplane 324x235

Bipartisan Bill Introduced to Ban Calls During Flights

Senators Edward J. Markey (D-Mass.) and Lamar Alexander (R-Tenn.) last week introduced bipartisan legislation directing the U.S. Secretary of Transportation to issue regulations to prohibit the use of cell phones for voice calls on airplanes. The legislation, the Commercial Flight...
breach  Security breach7 324x235

Anthem to Pay $115M in Largest Data Breach Settlement Yet

A proposed settlement has been reached in a class action lawsuit over the 2015 cyberattack of health insurer Anthem, Inc., involving the theft of the personal information of 78.8 million people. The $115 million settlement, if approved by the...
cyberspy  Security cyberspy 324x235

Massive Cyberattack Underway Worldwide: Reports From Ukraine, Denmark, Russia and UK

Early reports blame Petya, a variant of the infamous WannaCry ransomware A cyberattack has caused outages on several government websites, and those of companies in several countries, including Ukraine, Russia, Denmark and the UK. The hack started, or was first discovered...
cyberattack  Security cybera 324x235

Ukraine Under Siege by Major Cyberattack

Ukraine is under siege by a major cyberattack which has crippled the government’s IT network. The cyberattack has affected airports, the Ukrainian central bank, the state power distributor Ukrenergo, the aircraft manufacturer Antonov, and two postal services. The central bank...
cybersecurity  Security cyber22 324x235

New Bill Seeks to Boost Cybersecurity for Small Businesses

A bipartisan, bicameral legislation to improve cybersecurity resources for small businesses was introduced Thursday. The Small Business Development Center (SBDC) Cyber Training Act will expand efforts to train SBDC employees to become certified in cyber strategy counseling. Senator Gary Peters...
blockchain  Security blockchain112 324x235

London-Based Startup Blockchain Receives $40M in VC Funding – Largest Series B in Fintech Yet

London-based startup Blockchain, a leading software platform for digital assets, announced last week that they have raised a Series B of $40 million with Lakestar and GV (formerly Google Ventures) with additional participation from Nokota Management and Digital Currency...
grid  Security powergrid 324x235

Democratic Senators Urge Trump Administration to Protect U.S. Energy Infrastructure From Cyberattacks

A group of Democratic Senators on Thursday wrote President Donald Trump and the Department of Energy (DOE), reiterating the need for Trump to direct the latter to “conduct a thorough analysis of Russian capabilities with respect to cyberattacks on...
hacker  Security hacker 324x235

British Parliament Targeted by Hackers in ‘Sustained and Determined’ Cyberattack

The British Parliament was the target of a “sustained” cyberattack as hackers sought to gain access to the email accounts of MPs and their staff.  The attack left the users unable to access their email as the hackers probed...
database  Security database 324x235

Voter Information of Nearly 200M People Exposed Due to Breach of Contractor’s Database

Detailed voter information on about 198 million potential voters was left exposed to unauthorized access on the internet by a data analytics contractor employed by the Republican National Committee (RNC), and other GOP clients. The contractor, Deep Root Analytics, left...
Security eagle eye 324x235

Eagle Eye Networks Acquires Panasonic Cloud Management Service Europe B.V.

Eagle Eye Networks, Inc. on Friday announced the acquisition of Panasonic Cloud Management Service Europe B.V. (PCMSEU) makers of Panasonic Cameramanager and Panasonic Nubo.  PCMSEU operated the largest number of cloud recorded cameras in Europe and now combined with Eagle...
hacker  Security hacker4 324x235

Lawmakers Introduce Hack DHS Act, Bipartisan Bill to Establish Bug Bounty Program at DHS

Senators Maggie Hassan (D-NH) and Rob Portman (R-OH) introduced a bill on Friday which would establish a bug bounty pilot program – modeled off of similar programs at the Department of Defense and major tech companies – in order...
hack  Security hack8 324x235

The Shadow Brokers Debut ‘Monthly Dump Service’

Hacking group TheShadowBrokers have launched what they called a “monthly dump service,” promising to release some interesting vulnerabilities this June. This subscription-based service requires interested entities to subscribe and send 100 ZEC (Zcash) to a stated address. The hackers included...
Security data breach2 324x235

Chipotle Affirms Malware Responsible for Security Breach

Chipotle Mexican Grill on Friday provided further information about the payment card security incident that the company previously reported in April. An investigation involving cybersecurity firms, law enforcement and the payment card networks identified the operation of malware designed to...
Security health it 3 324x235

HHS to Launch Cybersecurity Center to Tackle Threats in Healthcare Sector

The Department of Health and Human Services (HHS) will soon launch a healthcare focused cybersecurity initiative modeled on the Homeland Security Department’s National Cybersecurity and Communications Integration Center (NCCIC), according to a press release.  This was revealed by Christopher Wlaschin,...
Security speed 324x235

New Network Protocol Creates High-Speed Internet Lane for Emergency Situations

Researchers at Rochester Institute of Technology are developing what they call a faster and more reliable way to send and receive large amounts of data through the internet, by a creating a new network protocol, called Multi Node Label...
blockchain  Security blockchain7 324x235

Nasdaq, Citi Partner on Blockchain Payment System

Nasdaq and Citi Treasury and Trade Solutions announced Monday a new integrated payment solution that enables straight through payment processing and automates reconciliation by using a distributed ledger to record and transmit payment instructions. A number of payment transactions have...
Security data breach2 324x235

Target to Resolve Massive 2013 Data Breach With $18.5M Multi-State Settlement

New York Attorney General Eric T. Schneiderman said Tuesday that 47 states and the District of Columbia have reached a $18.5 million settlement with the Target Corporation to resolve the states' investigation into the retail company's 2013 data...
Security privacy12 324x235

Lawmaker Introduces Bill to Protect Online Privacy

Communications and Technology Subcommittee Chairman Marsha Blackburn (R-Tenn.) on Thursday introduced the Balancing the Rights of Web Surfers Equally and Responsibly (BROWSER) Act of 2017 to protect the online privacy of Americans. The legislation designates the Federal Trade Commission (FTC)...
toyota  Security toyota 324x235

Toyota, Industry Partners Explore Use of Blockchain Tech for Autonomous Vehicles

Toyota Research Institute (TRI), a wholly owned unit of Toyota Motor North America, said Monday it is collaborating with MIT Media lab and several industry partners to explore blockchain and distributed ledger technology (BC/DL) for use in the development...
hacker  Security hacker4 324x235

PATCH Act: Lawmakers Introduce Bill to Establish Govt. Cyber Vulnerability Review Board

A bipartisan group of lawmakers introduced a bill Wednesday that aims to prevent another mass leak of government-owned hacking tools, by forcing the government to present its haul of undisclosed zero-day exploits it uses to target computers and networks...
us house  Security us house of rep 324x235

House Passes Hurd-Connolly IT Modernization Bill

A bill to create avenues for agencies to modernize their IT systems passed the House in a floor vote Wednesday. The Hurd-Connolly Modernizing Government Technology Act maintains that current aging government technology is not only expensive and inefficient, but also...
Security docu 324x235

DocuSign Hacked: Hackers Access Database and Embark on Phishing Campaign

Electronic signature service DocuSign said Tuesday it had confirmed that “a malicious third party had gained temporary access to a separate, non-core system that allows us to communicate service-related announcements to users via email.” According to DocuSign, a complete forensic...
Dave Shuman  Security Dave Shuman headshot 321x235

Autonomous Vehicles are a Huge Market for Data Analytics – Cloudera

Cloudera's Dave Shuman talks about the value of big data from autonomous vehicles, and using analytics to counter new and emerging cyber threats. Autonomous Vehicles are a big Market for Data There will be several areas where data can be collected and...
cybersecurity  Security cyber6 324x235

FTC Creates Platform to Help Small Businesses Bolster Cybersecurity

The Federal Trade Commission (FTC) has launched a new website – ftc.gov/SmallBusiness – with articles, videos, and other information aimed at helping small business owners avoid scams and protect their computers and networks from cyberattacks and other threats. The FTC’s...
blockchain  Security blockchain23 324x235

Intel, PokitDok Collaborate on Blockchain Solution for Recording Healthcare Transactions

Healthcare API company PokitDok announced last week that it has selected the Linux Foundation’s Hyperledger Sawtooth as its premier platform for recording DokChain healthcare transactions. Hyperledger Sawtooth is an open source blockchain project contributed by Intel. DokChain is PokitDok’s implementation...
dhs  Security dhs 324x235

Startups Get Funding From DHS for Blockchain Research Projects

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded $9.7 million to 12 small businesses for 13 Phase II contracts through the Small Business Innovation Research (SBIR) program. Three of the companies received approximately $2.25 million for...
renault  Security renault 324x235

Renault, Nissan and Several Organizations Targeted by Largest Global Ransomware Attack Yet

Nissan's manufacturing plant in Sunderland, northeast England, was hit by a cyberattack that has affected over 74 countries, a spokesman for the Japanese carmaker said Saturday. “Like many organizations around the world, some Nissan entities were recently targeted by a...
ransomware  Security ransomware3 324x235

WannaCry: ‘Tens of Thousands’ of Targets in up to 74 Countries Affected by Widespread Ransomware Campaign

The Department of Homeland Security's United States Computer Emergency Readiness Team (US-CERT) has issued an alert regarding a widespread ransomware campaign affecting various organizations, with reports of tens of thousands of infections in as many as 74 countries, including...
cyber  Security cyber23 324x235

NIST Releases Draft Guidance for Securing Wireless Infusion Pumps

NIST’s National Cybersecurity Center of Excellence (NCCoE), in collaboration with the healthcare community and manufacturers, has developed cybersecurity guidance, draft NIST Special Publication 1800-8: Securing Wireless Infusion Pumps in Healthcare Delivery Organizations, which uses standards-based, commercially available technologies and...
laptop  Security laptop 324x235

Audio Driver Installed in HP Laptops Contains keylogger That Records Every Keystroke: Security Firm

Swiss security firm Modzero said in a security advisory posted Thursday that an audio driver installed in several HP laptops contains a keylogger feature that records every keystroke entered into the computer into a log file. The company has been...
cybersecurity  Security cybersecurity1 324x235

Trump Signs Executive Order on Cybersecurity: NIST Framework Now a Must for Agencies

President Donald Trump has signed an executive order aimed at strengthening the cybersecurity of federal networks and critical infrastructure. In this context, cybersecurity risk management comprises the full range of activities undertaken to protect IT and data from unauthorized access...
kaspersky  Security kaspersky 324x235

Intelligence Chiefs Reviewing Use of Kaspersky Software: Firm Denies Ties to Govt. Cyberespionage

Senior U.S. intelligence officials on Thursday told a Congressional committee that they were concerned that Moscow-based Kaspersky Lab, one of the world’s largest cybersecurity firms, could pose a threat to the U.S. homeland. “We are tracking Kaspersky and their software,”...
bitcoin  Security bitcoin4 324x235

U.N. Launches Training Aimed at Tackling Cryptocurrency-Enabled Organized Crime

The United Nations Office on Drugs and Crime (UNODC) said Monday it has developed what it termed a “world-leading Cryptocurrency Investigation Train-the-Trainers course,” and delivered, in recent weeks, the first courses on cryptocurrency investigation. This is in response to the...
phone  Security pnone11 324x235

DHS Submits Report to Congress Detailing Threats From Use of Mobile Phones

The Department of Homeland Security (DHS) has submitted a report to Congress that details current and emerging threats to the Federal government’s use of mobile device, recommending security improvements within the mobile device ecosystem, the agency announced Thursday. The study...
google  Security google21 324x235

US-CERT Weighs in on Phishing Campaign Targeting Google Docs Users

The United States Computer Emergency Readiness Team (US-CERT) said Thursday it is aware of the phishing campaign affecting Google Docs users. The campaign used spoofed email addresses to target users with emails purporting to share a document for collaboration. Once...
autonomous  Security autonomous4 324x235

Faurecia, ZF Partner to Develop Interior and Safety Technologies for Self-Driving Cars

ZF and Faurecia will partner to development interior and safety technologies for autonomous driving, they said in a statement on Wednesday. ZF specializes in driveline and chassis technology as well as active and passive safety technology, while Faurecia is...
ai  Security ai44 324x235

Privacy Group Sues NYPD For Info on Facial-Recognition Technology

The Center for Privacy & Technology at Georgetown University law school sued the New York Police Department on Tuesday to demand access to documents associated with its use of facial-recognition technology. According to the privacy group, the NYPD had initially...
cybersecurity  Security cybersecurity2 324x235

House Panel Passes Bill Aimed at Helping Small Businesses Improve Their Cyber Defenses

The House Science Committee passed legislation Tuesday requiring the National Institute of Standards and Technology (NIST), the government’s cybersecurity standards agency, to provide guidance and other resources to small businesses to help them bolster their cyber posture. H.R. 2105, the...
iot  Security iot212 324x235

Senator Introduces Bill to Nullify FCC’s Open Internet Order

Sen. Mike Lee (R-UT) on Monday introduced a bill that would nullify the Federal Communications Commission’s 2015 Open Internet Order and prohibit the FCC from issuing a similar rule in the future. The bill, Restoring Internet Freedom Act, is...
smart grid  Security grid 324x235

TenneT, IBM, Others Collaborate to Develop Blockchain Tech for Managing Power Grid

IBM said Tuesday it is joining forces with TenneT, sonnen and Vandebron to develop blockchain technology for managing the electricity grid in the Netherlands and Germany. This innovative technology is the next step in enabling decentralized flexible energy sources to...
digital  Security digital 324x235

Lawmakers Launch Bipartisan Digital Trade Caucus

Reps. Erik Paulsen (R-Minn.) and Suzan DelBene (D-Wash.) launched the Congressional Digital Trade Caucus Monday to promote a U.S. trade policy that works in the digital economy. Digital trade accounts for more than half of U.S. service exports. The United...
cybersecurity  Security cyber22 324x235

Trump Signs Executive Order Establishing American Technology Council

President Donald Trump has signed an executive order creating a new technology council to "transfer and modernize" the U.S. government's information technology systems, according to a press release by the White House on Monday.  The executive order establishes the...
Security internet of things 324x235

Federal Court Declines to Rehear Net Neutrality Challenge

The U.S. Appeals Court for the District of Columbia on Monday rejected a request by telecommunications companies to rehear arguments challenging the Federal Communications Commission (FCC) net neutrality rules, citing FCC Chairman Ajit Pai’s plan to repeal the rules. The...
guardtime  Security guardtime 324x235

Lockheed Martin Incorporates Blockchain Tech, Collaborates With Guardtime Federal on Cyber Initiatives

Lockheed Martin said it has contracted Guardtime Federal as a key supplier to integrate a variety of cyber-related elements into systems engineering processes, supply chain risk management and software development efforts.  The company claims it is the first U.S. defense...
internet  Security internet5 324x235

FCC to Reverse Net Neutrality Rules

Federal Communications Commission (FCC) Chairman Ajit Pai on Wednesday commented on his plans to roll back net neutrality, a development which people in the tech industry and the general public view as a precursor to an unequal internet. Pai, an...
hacker  Security hacker8 324x235

Airforce Launches Bug Bounty Program, Open to Overseas Hackers

The Air Force announced Wednesday that it is launching a bug bounty for several of its public-facing websites, allowing hackers to seek out security vulnerabilities in the sites in exchange for monetary compensation. This follows the successful launch of Hack...
Security credit card 324x235

Chipotle Warns Customers About Breach of Payment System

Fast food chain Chipotle warned customers through a notice on its website on Tuesday that it is investigating a breach of the network that supports payment processing for  purchases made in the company’s restaurants.   “…we recently detected unauthorized activity...
blockchain  Security blockchain112 324x235

Ukraine Partners With Tech Firm Bitfury to Put Government Data on Blockchain Platform

The Bitfury Group, a full service Blockchain technology company, said last week The State Agency for eGovernance of Ukraine signed what it described as “a groundbreaking first-ever Memorandum of interaction and cooperation to create the first full-scale Blockchain eGovernance...
security  Security security8 324x235

Tech Companies, Industry Groups Request for Changes to NIST’s Cybersecurity Framework

Tech companies, civil society groups, and individuals have submitted comments in response to the National Institute of Standards and Technology's (NIST) request for public comment on version 1.1 of the "Framework for Improving Critical Infrastructure Cybersecurity.” They recommended that NIST...
money  Security money12 324x235

SWIFT Introduces New Service to Check Fraud and Cyber crime

Belgium-based interbank messaging service SWIFT, used to transfer trillions of dollars between banks every day, said Wednesday it is providing a new tool to help banks fight cyber crime. The new fraud and cyber-crime prevention service will enable SWIFT customers...
blockchain  Security blockchain22 324x235

UK’s Royal Mint, CME Group Trial Blockchain-Based Platform for Trading Gold

Britain's Royal Mint and Chicago-based exchange CME Group Inc are testing a new platform for trading gold based on blockchain technology. RMG (Royal Mint Gold), is a digital gold product created by The Royal Mint and CME Group. CME Group...
blockchain  Security blockchain 2 324x235

Fidelity Collaborates With Academic and Tech Firms to Develop Blockchain Technology

Fidelity Labs, the R&D and Innovation unit of Fidelity Investments, said Monday it is the first in the financial services industry to join faculty members at Cornell University, Cornell Tech, UC Berkeley, University of Illinois at Urbana–Champaign, and the...
botnet  Security cy1 324x235

Justice Department Targets Kelihos Botnet Used Extensively by Cybercriminals

The Justice Department on Monday announced an extensive effort to disrupt and dismantle the Kelihos botnet – a global network of tens of thousands of infected computers under the control of a cybercriminal that was used to facilitate malicious...
cyberspy  Security cyberspy 324x235

Symantec Attributes CIA-Linked Cyberespionage Toolkit to 40 Spying Operations in 16 Countries

Security company Symantec has attributed cyberattacks against at least 40 targets in 16 different countries to spying and operational protocols revealed in a CIA operational toolkit made public by WikiLeaks. According to Symantec, a group which the company refers to...
office  Security office 324x235

Hackers Target Word Users by Exploiting Microsoft Office Zero-Day Vulnerability

Hackers are exploiting a vulnerability in Microsoft Word which can be manipulated to install malware on targeted computers, even those computers that are fully patched and up to date. This zero-day attack was discovered by security researchers, FireEye, who...