"When pursuing quick-turn cyber operations, the Iranian regime will weigh religious and political reliability against offensive skills. The best operators are not always the most devout or loyal to …
Here’s How a National Cybersecurity Agency Could Work
"Over the past few months, some private-sector companies have called for building a national cybersecurity agency. This agency would consist of a centralized authority responsible for the nation’s …
Continue Reading about Here’s How a National Cybersecurity Agency Could Work
Critical PGP and S/MIME bugs can reveal encrypted e-mails.
"The Internet’s two most widely used methods for encrypting e-mail--PGP and S/Mime--are vulnerable to hacks that can reveal the plaintext of encrypted messages, a researcher warned late Sunday night. …
Continue Reading about Critical PGP and S/MIME bugs can reveal encrypted e-mails.
CIA to Use Amazon Cloud to Run Big Data Intelligence Experiments
"The Central Intelligence Agency is looking to team up with industry experts to run a series of open-source intelligence projects using its Amazon cloud. The agency released a revised acquisition …
Continue Reading about CIA to Use Amazon Cloud to Run Big Data Intelligence Experiments
Three Critical Factors Increasing Cyber Risk for 2019
In 2008, I wrote and essay entitled "The Year of Living Cyberdangerously" in which I noted that I couldn't "help but think that 2009 will be a precipice year in the cybersecurity domain." My gut …
Continue Reading about Three Critical Factors Increasing Cyber Risk for 2019
Hacker Shuts Down Copenhagen’s Public City Bikes System
"An unidentified hacker has breached Bycyklen —Copenhagen's city bikes network— and deleted the organization's entire database, disabling the public's access to bicycles over the weekend." Source: …
Continue Reading about Hacker Shuts Down Copenhagen’s Public City Bikes System
Apple kicks out iOS apps that share location data without asking you first
"Apple has removed a bunch of apps in the App Store that send location data to third parties without obtaining user consent, according to a report." Source: Apple kicks out iOS apps that share …
Continue Reading about Apple kicks out iOS apps that share location data without asking you first
Iran likely to retaliate with cyberattacks after nuclear deal collapse
"Iran is likely to respond with cyberattacks against Western businesses in response to the Trump administration's withdrawal from the nuclear deal, cybersecurity experts say." Source: Iran likely to …
Continue Reading about Iran likely to retaliate with cyberattacks after nuclear deal collapse
The Iran Nuclear Deal Unraveling Raises Fears of Cyberattacks
"Some still-unconfirmed signs suggest that Iran may be developing the ability to not only disrupt critical infrastructure with cyberattacks, but to destroy it. A highly sophisticated malware known as …
Continue Reading about The Iran Nuclear Deal Unraveling Raises Fears of Cyberattacks
Cryptojacking malware was secretly mining Monero on many government and university websites
"A new report published by security researched Troy Mursch details how the cryptocurrency mining code known as Coinhive is creeping onto unsuspecting sites around the web. Mursch recently detected the …