79.1 F
Washington, D.C.
Tuesday, August 22, 2017

NIST Publishes Cybersecurity Workforce Framework

Cybersecurity

Security african american 324x235

IBM, Sony Partner on Blockchain-Based Education Data Management System

IBM said Wednesday that Sony Corporation and Sony Global Education, a subsidiary of Sony that works to provide global educational services, have developed a new blockchain-based student education records platform. With the solution, school administrators can consolidate and manage students'...
microsoft  Security microsoft 324x235

Microsoft Announces CoCo Framework to Advance Enterprise Adoption of Blockchain Tech

Microsoft Corp. on Thursday announced the Coco Framework, "a first-of-its-kind innovation" that will advance enterprise adoption of blockchain technology. Current blockchain protocol technology requires complicated development techniques to meet the operational and security needs of enterprises. The Coco Framework reduces...
drone  Security drone4 324x235

Lawmakers Introduce Bill to Protect Aircraft from Drones

U.S. Representative Jim Langevin (D-RI) and Senator Sheldon Whitehouse (D-RI) last week introduced the Drone Operator Safety Act, a bill to help protect American air traffic from the misuse of drones. The bill would make it a criminal offense to...
Security autonomous4 2 324x235

UK Government Issues Cybersecurity Guidance for Autonomous Vehicles

The British government has unveiled new government guidance which it says will ensure engineers developing smart vehicles will apply tougher cyber protections in their designs to help combat hacking. The government is also looking at a broader program of...
Security border wall 324x235

Hurd Introduces Smart Wall Legislation

U.S. Representative Will Hurd (R-TX) last week introduced the Secure Miles with All Resources and Technology (SMART) Act. Representatives Henry Cuellar (D-TX), David G. Valadao (R-CA), Steve Knight (R-CA), Steve Pearce (R-NM), Brian Fitzpatrick (R-PA), and Keith Rothfus...
Security breach1 324x235

Justice Department Releases Framework to Help Organizations Design Bug Bounty Programs

The Justice Department has released guidelines to help organizations design bug bounty programs. The Criminal Division’s Cybersecurity Unit has prepared this framework to assist organizations interested in instituting a formal vulnerability disclosure program. It provides a rubric of considerations...
hacker  Security hacker 324x235

Hackers Claim Credit for Data Leak From Alleged Breach of FireEye’s Mandiant

Multiple reports have it that a set of systems operated by Adi Peretz, a Senior Threat Intelligence Analyst at at Mandiant, a subsidiary of cybersecurity firm FireEye, was apparently compromised by hackers, exposing sensitive data. The hackers hinted at the...
Security breach1 324x235

Report: Data Breach Exposes ‘Close to 4 Million’ Dow Jones Customer Accounts

Cybersecurity firm UpGuard reported Monday that a cloud-based file repository owned by financial publishing firm Dow Jones & Company, which had been configured to allow semi-public access exposed the sensitive personal and financial details of millions of the company’s...
net neutrality  Security net neutrality1 324x235

Tech Firms Urge FCC to Shelve Plans to Reverse Net Neutrality Rules

The Internet Association, a group representing major tech firms including Facebook, Google, Microsoft and Amazon, on Monday urged the U.S. Federal Communications Commission (FCC) to end plans to reverse 2015 rules prohibiting ISPs from manipulating the speed of consumers...
Security fedex 324x235

FedEx Discloses Petya Cyberattack on TNT Systems Will Have ‘Financial Consequences’

Courier company FedEx Corp said Monday the recent Petya cyberattack will “negatively impact” its revenue as the company struggles to recover from the consequences of the attack. The company made this disclosure in its annual report on Form 10-K...
blockchain  Security hyper 324x235

Hyperledger Releases Hyperledger Fabric 1.0, Open Source Blockchain Framework

Hyperledger, a collaborative cross-industry effort created to advance blockchain technology, announced on Tuesday the general availability of Hyperledger Fabric 1.0. Hosted by The Linux Foundation, Hyperledger Fabric is a blockchain framework implementation and intended as a foundation for developing...
cyber  Security cyber9 324x235

Senators Introduce Legislation to Combat Cybercrime

A bipartisan pair of senators on Thursday introduced legislation aimed at combating cybercrime against U.S. computer networks. Congresswoman Anna Eshoo (D-CA), Senator Orrin Hatch (R-UT), Senator Ed Markey (D-MA) and Congresswoman Susan Brooks (R-IN) introduced legislation to combat cyberattacks...
airplane  Security airplane 324x235

Bipartisan Bill Introduced to Ban Calls During Flights

Senators Edward J. Markey (D-Mass.) and Lamar Alexander (R-Tenn.) last week introduced bipartisan legislation directing the U.S. Secretary of Transportation to issue regulations to prohibit the use of cell phones for voice calls on airplanes. The legislation, the Commercial Flight...
breach  Security breach7 324x235

Anthem to Pay $115M in Largest Data Breach Settlement Yet

A proposed settlement has been reached in a class action lawsuit over the 2015 cyberattack of health insurer Anthem, Inc., involving the theft of the personal information of 78.8 million people. The $115 million settlement, if approved by the...
cyberspy  Security cyberspy 324x235

Massive Cyberattack Underway Worldwide: Reports From Ukraine, Denmark, Russia and UK

Early reports blame Petya, a variant of the infamous WannaCry ransomware A cyberattack has caused outages on several government websites, and those of companies in several countries, including Ukraine, Russia, Denmark and the UK. The hack started, or was first discovered...
cyberattack  Security cybera 324x235

Ukraine Under Siege by Major Cyberattack

Ukraine is under siege by a major cyberattack which has crippled the government’s IT network. The cyberattack has affected airports, the Ukrainian central bank, the state power distributor Ukrenergo, the aircraft manufacturer Antonov, and two postal services. The central bank...
cybersecurity  Security cyber22 324x235

New Bill Seeks to Boost Cybersecurity for Small Businesses

A bipartisan, bicameral legislation to improve cybersecurity resources for small businesses was introduced Thursday. The Small Business Development Center (SBDC) Cyber Training Act will expand efforts to train SBDC employees to become certified in cyber strategy counseling. Senator Gary Peters...
blockchain  Security blockchain112 324x235

London-Based Startup Blockchain Receives $40M in VC Funding – Largest Series B in Fintech Yet

London-based startup Blockchain, a leading software platform for digital assets, announced last week that they have raised a Series B of $40 million with Lakestar and GV (formerly Google Ventures) with additional participation from Nokota Management and Digital Currency...
grid  Security powergrid 324x235

Democratic Senators Urge Trump Administration to Protect U.S. Energy Infrastructure From Cyberattacks

A group of Democratic Senators on Thursday wrote President Donald Trump and the Department of Energy (DOE), reiterating the need for Trump to direct the latter to “conduct a thorough analysis of Russian capabilities with respect to cyberattacks on...
hacker  Security hacker 324x235

British Parliament Targeted by Hackers in ‘Sustained and Determined’ Cyberattack

The British Parliament was the target of a “sustained” cyberattack as hackers sought to gain access to the email accounts of MPs and their staff.  The attack left the users unable to access their email as the hackers probed...
database  Security database 324x235

Voter Information of Nearly 200M People Exposed Due to Breach of Contractor’s Database

Detailed voter information on about 198 million potential voters was left exposed to unauthorized access on the internet by a data analytics contractor employed by the Republican National Committee (RNC), and other GOP clients. The contractor, Deep Root Analytics, left...
Security eagle eye 324x235

Eagle Eye Networks Acquires Panasonic Cloud Management Service Europe B.V.

Eagle Eye Networks, Inc. on Friday announced the acquisition of Panasonic Cloud Management Service Europe B.V. (PCMSEU) makers of Panasonic Cameramanager and Panasonic Nubo.  PCMSEU operated the largest number of cloud recorded cameras in Europe and now combined with Eagle...
hacker  Security hacker4 324x235

Lawmakers Introduce Hack DHS Act, Bipartisan Bill to Establish Bug Bounty Program at DHS

Senators Maggie Hassan (D-NH) and Rob Portman (R-OH) introduced a bill on Friday which would establish a bug bounty pilot program – modeled off of similar programs at the Department of Defense and major tech companies – in order...
hack  Security hack8 324x235

The Shadow Brokers Debut ‘Monthly Dump Service’

Hacking group TheShadowBrokers have launched what they called a “monthly dump service,” promising to release some interesting vulnerabilities this June. This subscription-based service requires interested entities to subscribe and send 100 ZEC (Zcash) to a stated address. The hackers included...
Security data breach2 324x235

Chipotle Affirms Malware Responsible for Security Breach

Chipotle Mexican Grill on Friday provided further information about the payment card security incident that the company previously reported in April. An investigation involving cybersecurity firms, law enforcement and the payment card networks identified the operation of malware designed to...
Security health it 3 324x235

HHS to Launch Cybersecurity Center to Tackle Threats in Healthcare Sector

The Department of Health and Human Services (HHS) will soon launch a healthcare focused cybersecurity initiative modeled on the Homeland Security Department’s National Cybersecurity and Communications Integration Center (NCCIC), according to a press release.  This was revealed by Christopher Wlaschin,...
Security speed 324x235

New Network Protocol Creates High-Speed Internet Lane for Emergency Situations

Researchers at Rochester Institute of Technology are developing what they call a faster and more reliable way to send and receive large amounts of data through the internet, by a creating a new network protocol, called Multi Node Label...
blockchain  Security blockchain7 324x235

Nasdaq, Citi Partner on Blockchain Payment System

Nasdaq and Citi Treasury and Trade Solutions announced Monday a new integrated payment solution that enables straight through payment processing and automates reconciliation by using a distributed ledger to record and transmit payment instructions. A number of payment transactions have...
Security data breach2 324x235

Target to Resolve Massive 2013 Data Breach With $18.5M Multi-State Settlement

New York Attorney General Eric T. Schneiderman said Tuesday that 47 states and the District of Columbia have reached a $18.5 million settlement with the Target Corporation to resolve the states' investigation into the retail company's 2013 data...
Security privacy12 324x235

Lawmaker Introduces Bill to Protect Online Privacy

Communications and Technology Subcommittee Chairman Marsha Blackburn (R-Tenn.) on Thursday introduced the Balancing the Rights of Web Surfers Equally and Responsibly (BROWSER) Act of 2017 to protect the online privacy of Americans. The legislation designates the Federal Trade Commission (FTC)...
toyota  Security toyota 324x235

Toyota, Industry Partners Explore Use of Blockchain Tech for Autonomous Vehicles

Toyota Research Institute (TRI), a wholly owned unit of Toyota Motor North America, said Monday it is collaborating with MIT Media lab and several industry partners to explore blockchain and distributed ledger technology (BC/DL) for use in the development...
hacker  Security hacker4 324x235

PATCH Act: Lawmakers Introduce Bill to Establish Govt. Cyber Vulnerability Review Board

A bipartisan group of lawmakers introduced a bill Wednesday that aims to prevent another mass leak of government-owned hacking tools, by forcing the government to present its haul of undisclosed zero-day exploits it uses to target computers and networks...
us house  Security us house of rep 324x235

House Passes Hurd-Connolly IT Modernization Bill

A bill to create avenues for agencies to modernize their IT systems passed the House in a floor vote Wednesday. The Hurd-Connolly Modernizing Government Technology Act maintains that current aging government technology is not only expensive and inefficient, but also...
Security docu 324x235

DocuSign Hacked: Hackers Access Database and Embark on Phishing Campaign

Electronic signature service DocuSign said Tuesday it had confirmed that “a malicious third party had gained temporary access to a separate, non-core system that allows us to communicate service-related announcements to users via email.” According to DocuSign, a complete forensic...
Dave Shuman  Security Dave Shuman headshot 321x235

Autonomous Vehicles are a Huge Market for Data Analytics – Cloudera

Cloudera's Dave Shuman talks about the value of big data from autonomous vehicles, and using analytics to counter new and emerging cyber threats. Autonomous Vehicles are a big Market for Data There will be several areas where data can be collected and...
cybersecurity  Security cyber6 324x235

FTC Creates Platform to Help Small Businesses Bolster Cybersecurity

The Federal Trade Commission (FTC) has launched a new website – ftc.gov/SmallBusiness – with articles, videos, and other information aimed at helping small business owners avoid scams and protect their computers and networks from cyberattacks and other threats. The FTC’s...
blockchain  Security blockchain23 324x235

Intel, PokitDok Collaborate on Blockchain Solution for Recording Healthcare Transactions

Healthcare API company PokitDok announced last week that it has selected the Linux Foundation’s Hyperledger Sawtooth as its premier platform for recording DokChain healthcare transactions. Hyperledger Sawtooth is an open source blockchain project contributed by Intel. DokChain is PokitDok’s implementation...
dhs  Security dhs 324x235

Startups Get Funding From DHS for Blockchain Research Projects

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded $9.7 million to 12 small businesses for 13 Phase II contracts through the Small Business Innovation Research (SBIR) program. Three of the companies received approximately $2.25 million for...
renault  Security renault 324x235

Renault, Nissan and Several Organizations Targeted by Largest Global Ransomware Attack Yet

Nissan's manufacturing plant in Sunderland, northeast England, was hit by a cyberattack that has affected over 74 countries, a spokesman for the Japanese carmaker said Saturday. “Like many organizations around the world, some Nissan entities were recently targeted by a...
ransomware  Security ransomware3 324x235

WannaCry: ‘Tens of Thousands’ of Targets in up to 74 Countries Affected by Widespread Ransomware Campaign

The Department of Homeland Security's United States Computer Emergency Readiness Team (US-CERT) has issued an alert regarding a widespread ransomware campaign affecting various organizations, with reports of tens of thousands of infections in as many as 74 countries, including...
cyber  Security cyber23 324x235

NIST Releases Draft Guidance for Securing Wireless Infusion Pumps

NIST’s National Cybersecurity Center of Excellence (NCCoE), in collaboration with the healthcare community and manufacturers, has developed cybersecurity guidance, draft NIST Special Publication 1800-8: Securing Wireless Infusion Pumps in Healthcare Delivery Organizations, which uses standards-based, commercially available technologies and...
laptop  Security laptop 324x235

Audio Driver Installed in HP Laptops Contains keylogger That Records Every Keystroke: Security Firm

Swiss security firm Modzero said in a security advisory posted Thursday that an audio driver installed in several HP laptops contains a keylogger feature that records every keystroke entered into the computer into a log file. The company has been...
cybersecurity  Security cybersecurity1 324x235

Trump Signs Executive Order on Cybersecurity: NIST Framework Now a Must for Agencies

President Donald Trump has signed an executive order aimed at strengthening the cybersecurity of federal networks and critical infrastructure. In this context, cybersecurity risk management comprises the full range of activities undertaken to protect IT and data from unauthorized access...
kaspersky  Security kaspersky 324x235

Intelligence Chiefs Reviewing Use of Kaspersky Software: Firm Denies Ties to Govt. Cyberespionage

Senior U.S. intelligence officials on Thursday told a Congressional committee that they were concerned that Moscow-based Kaspersky Lab, one of the world’s largest cybersecurity firms, could pose a threat to the U.S. homeland. “We are tracking Kaspersky and their software,”...
bitcoin  Security bitcoin4 324x235

U.N. Launches Training Aimed at Tackling Cryptocurrency-Enabled Organized Crime

The United Nations Office on Drugs and Crime (UNODC) said Monday it has developed what it termed a “world-leading Cryptocurrency Investigation Train-the-Trainers course,” and delivered, in recent weeks, the first courses on cryptocurrency investigation. This is in response to the...
phone  Security pnone11 324x235

DHS Submits Report to Congress Detailing Threats From Use of Mobile Phones

The Department of Homeland Security (DHS) has submitted a report to Congress that details current and emerging threats to the Federal government’s use of mobile device, recommending security improvements within the mobile device ecosystem, the agency announced Thursday. The study...
google  Security google21 324x235

US-CERT Weighs in on Phishing Campaign Targeting Google Docs Users

The United States Computer Emergency Readiness Team (US-CERT) said Thursday it is aware of the phishing campaign affecting Google Docs users. The campaign used spoofed email addresses to target users with emails purporting to share a document for collaboration. Once...
autonomous  Security autonomous4 324x235

Faurecia, ZF Partner to Develop Interior and Safety Technologies for Self-Driving Cars

ZF and Faurecia will partner to development interior and safety technologies for autonomous driving, they said in a statement on Wednesday. ZF specializes in driveline and chassis technology as well as active and passive safety technology, while Faurecia is...
ai  Security ai44 324x235

Privacy Group Sues NYPD For Info on Facial-Recognition Technology

The Center for Privacy & Technology at Georgetown University law school sued the New York Police Department on Tuesday to demand access to documents associated with its use of facial-recognition technology. According to the privacy group, the NYPD had initially...
cybersecurity  Security cybersecurity2 324x235

House Panel Passes Bill Aimed at Helping Small Businesses Improve Their Cyber Defenses

The House Science Committee passed legislation Tuesday requiring the National Institute of Standards and Technology (NIST), the government’s cybersecurity standards agency, to provide guidance and other resources to small businesses to help them bolster their cyber posture. H.R. 2105, the...
iot  Security iot212 324x235

Senator Introduces Bill to Nullify FCC’s Open Internet Order

Sen. Mike Lee (R-UT) on Monday introduced a bill that would nullify the Federal Communications Commission’s 2015 Open Internet Order and prohibit the FCC from issuing a similar rule in the future. The bill, Restoring Internet Freedom Act, is...
smart grid  Security grid 324x235

TenneT, IBM, Others Collaborate to Develop Blockchain Tech for Managing Power Grid

IBM said Tuesday it is joining forces with TenneT, sonnen and Vandebron to develop blockchain technology for managing the electricity grid in the Netherlands and Germany. This innovative technology is the next step in enabling decentralized flexible energy sources to...
digital  Security digital 324x235

Lawmakers Launch Bipartisan Digital Trade Caucus

Reps. Erik Paulsen (R-Minn.) and Suzan DelBene (D-Wash.) launched the Congressional Digital Trade Caucus Monday to promote a U.S. trade policy that works in the digital economy. Digital trade accounts for more than half of U.S. service exports. The United...
cybersecurity  Security cyber22 324x235

Trump Signs Executive Order Establishing American Technology Council

President Donald Trump has signed an executive order creating a new technology council to "transfer and modernize" the U.S. government's information technology systems, according to a press release by the White House on Monday.  The executive order establishes the...
Security internet of things 324x235

Federal Court Declines to Rehear Net Neutrality Challenge

The U.S. Appeals Court for the District of Columbia on Monday rejected a request by telecommunications companies to rehear arguments challenging the Federal Communications Commission (FCC) net neutrality rules, citing FCC Chairman Ajit Pai’s plan to repeal the rules. The...
guardtime  Security guardtime 324x235

Lockheed Martin Incorporates Blockchain Tech, Collaborates With Guardtime Federal on Cyber Initiatives

Lockheed Martin said it has contracted Guardtime Federal as a key supplier to integrate a variety of cyber-related elements into systems engineering processes, supply chain risk management and software development efforts.  The company claims it is the first U.S. defense...
internet  Security internet5 324x235

FCC to Reverse Net Neutrality Rules

Federal Communications Commission (FCC) Chairman Ajit Pai on Wednesday commented on his plans to roll back net neutrality, a development which people in the tech industry and the general public view as a precursor to an unequal internet. Pai, an...
hacker  Security hacker8 324x235

Airforce Launches Bug Bounty Program, Open to Overseas Hackers

The Air Force announced Wednesday that it is launching a bug bounty for several of its public-facing websites, allowing hackers to seek out security vulnerabilities in the sites in exchange for monetary compensation. This follows the successful launch of Hack...
Security credit card 324x235

Chipotle Warns Customers About Breach of Payment System

Fast food chain Chipotle warned customers through a notice on its website on Tuesday that it is investigating a breach of the network that supports payment processing for  purchases made in the company’s restaurants.   “…we recently detected unauthorized activity...
blockchain  Security blockchain112 324x235

Ukraine Partners With Tech Firm Bitfury to Put Government Data on Blockchain Platform

The Bitfury Group, a full service Blockchain technology company, said last week The State Agency for eGovernance of Ukraine signed what it described as “a groundbreaking first-ever Memorandum of interaction and cooperation to create the first full-scale Blockchain eGovernance...
security  Security security8 324x235

Tech Companies, Industry Groups Request for Changes to NIST’s Cybersecurity Framework

Tech companies, civil society groups, and individuals have submitted comments in response to the National Institute of Standards and Technology's (NIST) request for public comment on version 1.1 of the "Framework for Improving Critical Infrastructure Cybersecurity.” They recommended that NIST...
money  Security money12 324x235

SWIFT Introduces New Service to Check Fraud and Cyber crime

Belgium-based interbank messaging service SWIFT, used to transfer trillions of dollars between banks every day, said Wednesday it is providing a new tool to help banks fight cyber crime. The new fraud and cyber-crime prevention service will enable SWIFT customers...
blockchain  Security blockchain22 324x235

UK’s Royal Mint, CME Group Trial Blockchain-Based Platform for Trading Gold

Britain's Royal Mint and Chicago-based exchange CME Group Inc are testing a new platform for trading gold based on blockchain technology. RMG (Royal Mint Gold), is a digital gold product created by The Royal Mint and CME Group. CME Group...
blockchain  Security blockchain 2 324x235

Fidelity Collaborates With Academic and Tech Firms to Develop Blockchain Technology

Fidelity Labs, the R&D and Innovation unit of Fidelity Investments, said Monday it is the first in the financial services industry to join faculty members at Cornell University, Cornell Tech, UC Berkeley, University of Illinois at Urbana–Champaign, and the...
botnet  Security cy1 324x235

Justice Department Targets Kelihos Botnet Used Extensively by Cybercriminals

The Justice Department on Monday announced an extensive effort to disrupt and dismantle the Kelihos botnet – a global network of tens of thousands of infected computers under the control of a cybercriminal that was used to facilitate malicious...
cyberspy  Security cyberspy 324x235

Symantec Attributes CIA-Linked Cyberespionage Toolkit to 40 Spying Operations in 16 Countries

Security company Symantec has attributed cyberattacks against at least 40 targets in 16 different countries to spying and operational protocols revealed in a CIA operational toolkit made public by WikiLeaks. According to Symantec, a group which the company refers to...
office  Security office 324x235

Hackers Target Word Users by Exploiting Microsoft Office Zero-Day Vulnerability

Hackers are exploiting a vulnerability in Microsoft Word which can be manipulated to install malware on targeted computers, even those computers that are fully patched and up to date. This zero-day attack was discovered by security researchers, FireEye, who...
plane  Security plane 324x235

FCC Chairman Moves to Stop Plan to Allow In-Flight Calls

The Federal Communications Commission chairman Ajit Pai moved Monday to reverse efforts to allow the use of cellphones while on planes.  “I stand with airline pilots, flight attendants, and America’s flying public against the FCC’s ill-conceived 2013 plan to allow...
delphi  Security delphi 324x235

Delphi Zooms in on Data Generated by Connected Vehicles With Strategic Investments

Car parts supplier and integrator Delphi Automotive on Thursday announced a string of investments and partnerships in three companies to profit from the growing volume of data generated by the increasing number of internet-connected vehicles. The company invested in Isreali-based...
security  Security security8 324x235

Internet Security Protocol Bodies ISOC, OTA Merge

The Online Trust Alliance (OTA) and the Internet Society (ISOC) on Wednesday announced that the two global non-profit organizations have combined resources, expanding the reach and impact of the Internet Society to a broader group of stakeholders and industry...
cyber  Security insurance 324x235

AIG Offers Cyber Protection to Wealthy Individuals and Families

In what may be described as an offshoot of today’s reality, American International Group, Inc. (AIG) announced Monday that its Personal Insurance business is bringing the cyber protection and risk mitigation principles found in its CyberEdge Commercial Insurance to...
iot  Security iot23 324x235

SAYME, WISOL Aim to Become World’s Largest IoT LPWAN Solutions Manufacturer With New Partnership

Spanish device maker and solution provider SAYME and the South-Korean module manufacturer Wisol said Wednesday they are aligning to become the biggest high-quality LPWAN IoT solution maker with the best cost-benefit ratio of the market. In the IoT context, collaboration...
cybersecurity  Security cybersecurity2 324x235

Lawmakers Stress Necessity of Public-Private Alliance on Cybersecurity for Energy Infrastructure

U.S. Sen. Lisa Murkowski, R-Alaska, on Tuesday held a hearing to examine current efforts to protect domestic energy delivery systems from cybersecurity threats and evaluated efforts to secure the nation’s natural gas pipeline system. In addition to highlighting the work...
robot  Security robot6 324x235

IoT Garage Door Manufacturer Bricks Customer’s Device Following Bad Review

If this is not a testament to the frightful reality of the possibilities promised by the internet of everything, then nothing is. A manufacturer of IoT garage doors (don’t ask why it is necessary for a garage door to...
cyber attack  Security cyber attack 324x235

International Athletics Governing Body IAAF Suffers Cyberattack

The International Association of Athletics Federation ( IAAF) said Monday that it has been a victim of a cyberattack, which it believes has compromised athletes' Therapeutic Use Exemption (TUE) applications stored on IAAF servers. The organization attributed the attack to...
visa  Security visa1 324x235

DHS Targets H-1B, Visa Program for High-Skilled Workers

The U.S. Citizenship and Immigration Services (USCIS), a component of the Department of Homeland Security (DHS), on Monday announced multiple measures which it says are to further deter and detect H-1B visa fraud and abuse. Beginning Monday, USCIS says it...
privacy  Security iphone 518101 1920 324x235

AT&T, Comcast and Verizon Say They Won’t Sell Customers’ Browsing Data

AT&T, Comcast and Verizon released statements on Friday to the effect that they will not sell the individual internet browsing data of their customers. This is coming in the wake of the massive backlash from the general public and...
irs  Security irs 324x235

IRS to Strengthen Security of Its Data Retrieval Tool in the Wake of Fraudulent Activities

The Internal Revenue Service (IRS) and Federal Student Aid (FSA) jointly issued a statement on Thursday announcing the unavailability of IRS’s Data Retrieval Tool (DRT) till extra security protections are added. The IRS said identity thieves may have used personal...
bitcoin  Security bitcoin11 324x235

Japan Implements Law Recognizing Bitcoin, Other Virtual Currencies as Legal Payment

Legislation that defines digital currencies as legal payment method went into effect on April 1, 2017 in Japan. Japan’s Financial Services Agency released the text of the law on March, 24. The Accounting Standards Board of Japan has said...
Sam Hutton  Security Sam Hutton 324x235

Files as Attack Weapons: Glasswall’s Strategy Focuses on ‘Known Good’ to Secure Documents

Glasswell CTO, Sam Hutton talks about using ‘known good’ to provide protection against document-based cyberattacks Why Glasswall? The key selling point of Glasswall is that we are looking for good, and are enforcing good within business documents. We are able to...
security  Security security2 324x235

Mastercard Eyes IoT Security With NuData Security Acquisition

Mastercard announced Wednesday that it has entered into an agreement to acquire NuData Security, a global technology company that helps businesses prevent online and mobile fraud using session and biometric indicators. The acquisition will strengthen its efforts around device-level...
cloud  Security cloud5 324x235

Oracle’s ‘Industry-First’ Cloud Converged Storage Promises to Bridge On-Premises and Oracle Cloud Storage

Oracle on Wednesday unveiled what it called “the industry’s first Cloud Converged Storage, representing the first time a public cloud provider at scale has integrated its cloud services with its on-premises, high performance NAS storage systems.” Oracle ZFS Cloud software,...
at&t  Security att 324x235

AT&T Wins $6.5B Contract to Build and Manage Nation’s First Broadband Network

AT&T has been selected by the First Responder Network Authority (FirstNet) to build and manage the first broadband network dedicated to America’s police, firefighters and emergency medical services (EMS). The FirstNet network will cover all 50 states, 5 U.S. territories...
phone  Security phone5 324x235

Verizon to Install AppFlash, a Spyware, on Customers’ Android Phones – EFF

In the wake of the repeal of online privacy protections by Congress, Verizon has announced its intention to install spyware on android devices procured by customers suing its platform, according to the Electronic Frontier Foundation (EFF). Verizon is teaming up...
security  Security security 324x235

Lawmakers Introduce Legislation to Bolster Cybersecurity Resources for Small Businesses

A bipartisan group of senators on Wednesday introduced the Making Available Information Now to Strengthen Trust and Resilience and Enhance Enterprise Technology (MAIN STREET) Cybersecurity Act. The new legislation will provide a consistent set of resources for small businesses...
ibm  Security ibm 324x235

IBM, Trafigura, Natixis Pioneer First Blockchain Solution for U.S. Crude Oil Transactions

IBM, Natixis and Trafigura have pioneered the first blockchain solution in commodity trade finance for US crude oil transactions, IBM announced Tuesday. The distributed ledger platform, built on the Linux Foundation open source Hyperledger Fabric, allows major steps in a...
Josh Shaul  Security Josh Shaul of Akamai  324x235

Security is an Afterthought for Most IoT Device Manufacturers – Akamai

Josh Shaul is the Vice President for web security at Akamai. He and his team are responsible for Akamai’s web security products, and they build the products that Akamai uses to protect their customers from attacks on the internet. Akamai’s...
email  Security email 324x235

Over 25 Million Hacked Gmail, Yahoo Accounts Available for Purchase on the Dark Web

More than 26 million decrypted Gmail and Yahoo accounts stolen from previous data breaches are being sold on the Dark Web by a vendor with the handle, SunTzu583. The accounts were culled from several data breaches, including Bitcoin Security...
privacy  Security privacy8 324x235

EFF to Testify Before House Committee on Threat to Privacy From Use of Facial Recognition by Law Enforcement

The Electronic Frontier Foundation (EFF) Senior Staff Attorney Jennifer Lynch will testify Wednesday at a hearing before the House Committee on Oversight and Government Reform about what the organization calls “the FBI's efforts to build up and link together...
ibm  Security ibm 324x235

IBM Debuts Enterprise-Ready Blockchain Services Based on Hyperledger Fabric

IBM on Monday announced the release of IBM Blockchain, which it called the “first enterprise-ready” blockchain service based on the Linux Foundation’s Hyperledger Fabric version 1.0. According to IBM, the service helps developers quickly build and host security-rich production...
https  Security https2 324x235

HTTPS Interception Weakens TLS Security Warns US-CERT

The United States Computer Emergency Readiness Team (US-CERT) has issued a security advisory on the ability of HTTPS interception to weaken TLS security. US-CERT urged organizations that have performed a risk assessment and determined that HTTPS inspection is a requirement...
grid  Security grid power 324x235

BAE Systems to Develop Tech to Quickly Restore Power After a Cyberattack on Grid

The U.S. Defense Advanced Research Projects Agency (DARPA) has awarded BAE Systems an $8.6 million contract to develop technology designed to quickly restore power to the U.S. electric grid after a catastrophic failure caused by a cyberattack, the company...
security  Security security 324x235

Researchers Crack Major Internet Security Standard, SHA-1

Ten years after the introduction of internet security standard, Secure Hash Algorithm 1 (SHA-1), researchers at the Dutch research institute CWI and Google announced Thursday that they have broken it. The standard is widely used for digital signatures and...
Security microsoft3 2 324x235

Microsoft Sees Need for a Digital Geneva Convention to Address Nation-State Cybersecurity Attacks

Microsoft said Tuesday a digital Geneva Convention for cybersecurity is long overdue to task governments to protect civilians from nation-state cyberattacks in times of peace. “The time has arrived to call on the world’s governments to implement international rules...
grid  Security grid4 324x235

Raytheon, Utilidata Partner to Secure Utilities From Cyberattack

Raytheon, a technology and innovation firm specializing in defense, civil government and cybersecurity solutions, said last week it is partnering with Utilidata, a software company, to help power utilities proactively detect, defend against and respond to cyber threats. "Power utilities...
blockchain  Security blockchain231 324x235

Lawmakers Announce Launch of Congressional Blockchain Caucus

Rep. Jared Polis (D-Colo.) and David Schweikert (R-Ariz.) on Thursday announced the launch of the Congressional Blockchain Caucus, a bipartisan Caucus which they say will be dedicated to the advancement of sound public policy toward blockchain-based technologies and digital...
iot  Security iot25 324x235

IBM, Symantec, AT&T and Others Join Forces to Tackle IoT Security Challenges

IBM, Nokia, Palo Alto Networks, Symantec and Trustonic are partnering to use their combined expertise to help tackle today's top Internet of Things (IoT) security challenges, said AT&T last week. The companies have formed what they call an IoT Cybersecurity...
privacy  Security privacy8 324x235

In a Boost for Privacy, House Passes the Email Privacy Act

The U.S. House of Representatives on Monday voted that law enforcement agencies be required to obtain search warrants before seeking access to email and other stored data. The Email Privacy Act (H.R. 387) passed by voice vote. It is...
iot  Security iot7 324x235

GlobalPlatform Publishes Framework for Remote Management of Trusted Applications on Connected Devices

Technical standards body GlobalPlatform has published a framework which details how trusted applications hosted on a GlobalPlatform compliant Trusted Execution Environment (TEE) can be remotely and dynamically managed. The framework is applicable to any type of device including mobile and...