Archive

DHS to Congress: The Russians Are Coming Back

The House Intelligence Committee on Wednesday conducted a hearing focusing on the impact of Russian hacking on the 2016 elections. Members of the committee heard testimony from former DHS Secretary Jeh Johnson, who was in charge of the department when the actual hacking took place during the final m...

Broader Scope of Russian Election Cyberattacks Revealed

Federal and state officials have confirmed that cyberattacks against state voting systems during the 2016 election were more widespread than previously disclosed to the public, but they said the heightened activity did not impact final vote tallies. The confirmations follow Tuesday's Bloomberg repor...

Kaspersky to US: Check Our Source Code

Cybersecurity expert Eugene Kaspersky reportedly has volunteered to turn over his company's software source code to allay fears about possible ties with the Russian government. Kaspersky made the offer public at CeBIT Australia last week. Some U.S. officials have expressed concerns that Kaspersky La...

Massive Ransomware Attack Reaps Meager Profits

The WannaCry ransom attack that quickly circled the globe last week is not yet fully contained. So far, it has impacted more than 300,000 computers in 150 countries. However, one of the remarkable things about it is that only a trifling $100,000 in ransom, give or take, apparently has been paid. Hac...

Microsoft Bashes NSA Following Massive Ransomware Attacks

Microsoft this weekend unleashed its wrath on the National Security Agency, alleging it was responsible for the ransomware attack that began last week and has spread to thousands of corporate, government and individual computer systems around the world. Microsoft Chief Legal Officer Brad Smith launc...

Microsoft’s Timely Response to Shadow Brokers Threat Raises Questions

Just as the Shadow Brokers hacker group started crowing about a dump of never-seen-before flaws in Windows, Microsoft announced it already had fixed most of the exploits. "Today, Microsoft triaged a large release of exploits made publicly available by Shadow Brokers," said Microsoft Principal Securi...

WikiLeaks Dumps CIA Hacking Docs Online

WikiLeaks on Tuesday dumped thousands of classified documents onto the Internet, exposing hacking programs used by the CIA. The torrent of data is just the first in a series of dumps WikLeaks is calling "Vault 7." This first installment includes 8,761 documents and files stolen from an isolated high...

SPOTLIGHT ON SECURITY

What Should be on the Next President’s Cyberagenda?

When the new president takes up residence at 1600 Pennsylvania Ave., cybersecurity will be on the shortlist for action. What's a president to do? TechNewsWorld asked more than a dozen experts what should be at the top of the new leader of the free world's cyberagenda. Following are some of their res...

Cisco Battles Shadow Broker Exploits

Cisco has swung into action to combat a hacker group's exploitation of vulnerabilities in its firmware. The group, known as the "Shadow Brokers," released online malware and other exploits it claimed to have stolen from the Equation Group, which is believed to have ties to the United States National...

OPINION

From the Olympic Non-Robbery to Ford Getting Out of Cars, to Evil NSA: A Strange Week

There were three stories that caught my eye last week that I think deserve some additional discussion. One is the alleged robbery of U.S. Olympians followed by questions of whether it really happened because their phones weren't stolen. There may be a legitimate reason for that, and it suggests a l...

Edward Snowden Sheds Light on Shadow Brokers

NSA whistle-blower Edward Snowden on Tuesday injected himself into an escalating cyberstruggle that could affect the U.S. presidential election. The reported hack of The Equation Group might have been a warning shot from Russia, Snowden claimed. The group, which is widely believed to be a front oper...

Super-Sophisticated Spyware Spotted After 5-Year Run

Symantec and Kaspersky Lab last week separately announced the discovery of a highly sophisticated advanced persistent threat that had eluded security researchers for at least five years. A previously unknown group called "Strider" has been using Remsec, an advanced tool that seems to be designed pri...

Snowden Puts His Mind to Designing Spy-Proof Smartphone Cases

NSA whistle-blower Edward Snowden and noted hacker Andrew "Bunnie" Huang on Thursday published a paper on their collaboration to design a smartphone case that will protect user privacy. The pair developed a prototype compatible with the 4.7-inch iPhone 6, as it's "driven primarily by what we underst...

The Internet of Medical Things, Part 3: Safety First

Though quick to capitalize on connected health devices and the coming Internet of Medical Things, hardware manufacturers may be moving too slowly when it comes to building the necessary protections into the back end. The National Security Agency last month told participants in a defense technology s...

LinuxInsider Channels