“The Defense Department’s inconsistent security practices leave technical data about the nation’s missile defense system vulnerable to inside and outside threats, according to the agency auditor. The ballistic missile defense system is designed to detect and intercept incoming missiles before ...
Posts Tagged: Security
“Hackers are increasingly using false flag operations that wrongly point the blame toward China for some cyberattacks, threat intelligence experts said. Because Chinese hackers often rely on publicly available tools for their operations, it is easy to mimic their signature viruses, Brandon Helms, ...
“A misconfigured server exposed the taxpayer identification numbers, or Cadastro de Pessoas Físicas (CPFs), for 120 million Brazilian nationals for an unknown period of time Before a Brazilian national can perform many tasks such as opening a bank account, creating a business, paying taxes, o...
How do you compare and test the efficacy of cybersecurity products and companies when the information is proprietary? In many situations, you cannot. The research division of DHS is currently trying to understand how comparisons could be possible that are based on rational actor notions. With cybers...
“Open-source researchers often use satellite images, especially across multiple providers, to uncover information that is otherwise difficult to obtain. In November 2017, the World Bank released an analysis of satellite footage of ISIS-held territory to reveal that the statelet was struggling to p...
“An inexpensive Android hacking tool can create a covert communications channel in the power current generated while a smartphone charges on a power bank. The so-called ‘PowerSnitch’ attack, which was demonstrated here this week by Oxford University researcher Riccardo Spolaor, shows that a de...
“Municipal officials in Shanghai now take pride in the litany of Internet of Things applications in their city that make streets and homes safer. For instance, they say cameras at the entrance to a residential estate can scan the face of a driver and his car plate and instantly open the...
President Trump’s National Cyber Strategy includes the development of a “superior cyber workforce.” But given the difficulty in recruitment and retention of skilled cyber personnel, this goal may remain illusive. According to the Commerce and Homeland Security departments, there were around 29...