Archive

Cyberthreat Hunter FireEye Hacked by Nation-State Attackers

Cybersecurity firm FireEye, which has been prominent in the fight against nation-state cyberthreats, has been itself attacked by "a highly sophisticated threat actor, one whose discipline, operational security, and techniques," company CEO Kevin Mandia announced Tuesday. This indicates the attack is...

Controversial Plan Urges DoD to Recruit Tech Pros to WFH

The United States Defense Innovation Board has recommended that the Pentagon hire civilians to work from home who can handle classified information as a way of attracting people with technology expertise. The individuals sought "will have technical degrees and/or highly specialized skills in digital...

John McAfee Emerges With Private Cell Phone Data Service

The Ghost Cell Phone Data Service is part of a larger ecosystem which includes McAfee's Ghost cryptocurrency and GhostX Exchange for private cryptocurrency exchange. "The Ghost brand will encompass a range of practical, real world tools for people to protect our rights and take back our privacy," M...

OPINION

How the Quantum Tech Race Puts the World’s Data at Risk

The technology one-upmanship between the United States and China is fast becoming the new space race. There's been a lot of talk in the press about the competition to reach 5G, but little traction outside of the tech community about something more momentous: the dangers of computing in a post-quantu...

E-Commerce Startup Bolt Snags $68M to Grow Checkout Biz

E-commerce checkout platform vendor Bolt has raised $68 million to help it increase its engineering team, invest in additional enterprise functionality, partner with best-in-breed e-commerce platforms, and build and expand advanced features and functionality. Bolt's platform combines checkout, payme...

OPINION

The Democratic Debate That Wasn’t: How Tech Could Help Elections

I watched the Democratic debates last week and was struck by three things: I'd likely rather watch paint dry; the application of technology to improve the experience was nonexistent; and I'd bet that if the Democrats don't up their game President Trump will have them to thank when he wins re-electio...

NSA Admits Improper Collection of Phone Data, 2nd Time Around

The ACLU has released documents showing the NSA improperly collected Americans' call and text logs in 2017 and 2018. The unauthorized collections occurred just four months after the agency announced it was deleting more than 620 million call detail records acquired since 2015 under Title V of the Fo...

End of the Line for Windows 7: Open Road for Hackers

Microsoft has been urging customers to upgrade from its Windows 7 operating system, while attempting to ease the transition with several options for extended support. It will stop providing routine fixes and security patches effective January 2020. Regular support for Windows Server 2008 also is sch...

EXPERT ADVICE

How to Use a VPN for Safer Online Shopping

With the holidays fast approaching, are you looking to buy presents online? The holiday season has become synonymous with online shopping. This isn't really surprising as physical stores usually attract crowds of deal hunters. This often conjures up images of throngs of people waiting in line outsid...

OPINION

It Is Well Past Time for Elections to Be Online

Tomorrow a minority of those who are eligible will take time off, drive through traffic, and wait in lines to take part in one of the most artificially annoying obligations of U.S. citizenship: voting. Many who make that inconvenient trek will treat the process like a multiple choice test they haven...

EXCLUSIVE INTERVIEW

Former White House CIO Theresa Payton: ‘There Are Grave Concerns About Election Interference’

Theresa Payton, CEO of Fortalice Solutions, is one of the most influential experts on cybersecurity and IT strategy in the United States. She is an authority on Internet security, data breaches and fraud mitigation. She served as the first female chief information officer at the White House, oversee...

‘Five Eyes’ Nations Push for Encryption Backdoors

Strong encryption can be a threat to law enforcement and national security, the governments of the United States, United Kingdom, Canada, Australia and New Zealand said in a statement issued Sunday. "The increasing use and sophistication of certain encryption designs present challenges for nations i...

Zealot Loads Cryptocurrency Miner on Linux, Windows Machines

A new Apache Struts campaign that researchers named "Zealot" has come to light in recent weeks. Zealot loads Windows or Linux-based machines by installing a miner for Monero, which has become one of the hottest cryptocurrencies used in recent malware attacks. Zealot uses NSA-linked EternalBlue and E...

US Fingers North Korea for WannaCry Epidemic

The United States on Tuesday accused North Korea of responsibility for a global ransomware attack that locked down more than 300,000 computers in 150 countries earlier this year. The U.S. now has enough evidence to support its assertion that Pyongyang was behind the WannaCry attack in May, Homeland ...

LinuxInsider Channels