21 Sep 2018

Symantec takes on election hacking by fighting copycat websites

“Symantec is offering a free tool for US campaigns and election officials to fight fraudulent websites, the company announced Tuesday. The feature could help take away an important weapon in the election hacking arsenal: the spoof website.  Lookalike websites could imitate official government sites and report false information about candidates

Read More
21 Sep 2018

Foreign government hackers target US senators, aides’ Gmail

Google and the U.S. Senate have announced that the Gmail accounts of U.S. Senators’ and their aides are being “targeted by foreign government hackers.” While no information has been given regarding the political entity behind the attempts or whether specific political parties or staffers have been especially targeted, the attempts

Read More
20 Sep 2018

DoD releases first new cyber strategy in three years

The Department of Defense has released its first new cyber strategy document since 2015. The document affirms that the U.S. “cannot afford inaction,” and that U.S. cyber operations must more “amplify military lethality and effectiveness” more offensively. Defense officials conducted a review of the department’s cyber capabilities and strategy that

Read More
20 Sep 2018

Cybercriminals Are Targeting Your Payroll Accounts

“The FBI is warning of social engineering attacks being used to target employee payroll accounts. Once the attackers gain access to the account, they are changing the direct deposit bank account information to divert your salary to an account under their control and are also disabling alerts regarding payments made.

Read More
19 Sep 2018

State Department Confirms Email Data Breach

“The State Department detected unusual activity in its unclassified email system that may have compromised some employees’ personal information, a department spokesperson confirmed to Nextgov Tuesday. The ‘activity of concern’ affected less than 1 percent of State employee email inboxes, the spokesperson said. There’s no evidence of unusual activity affected

Read More
19 Sep 2018

Researchers: Users allowed to access infected sites found through search engines

“Users are largely allowed to access infected websites found through search engines, according to new research published Tuesday. Security firm SiteLock scanned more than 6 million of their clients’ sites during the second quarter of 2018. The firm found only 17 percent of infected sites are blacklisted by search engines like

Read More
19 Sep 2018

Indian government websites ‘hacked’ to mine crypto currencies

India is awaiting a Supreme Court case to decide the legal fate of cryptocurrencies in the country but, in the meantime, hackers have injected cryptojacking malware into government websites that are often designed on a budget with poor security practices and  infrequent updates. Rather than defacing a website or using

Read More
18 Sep 2018

US agencies see alliance between North Korean, Chinese hackers

“At a time when Washington is cautiously hopeful of a breakthrough in its long-troubled relations with Pyongyang, senior US officials are making strong allegations about the regime’s cyber crimes.In early September, The US Justice Department published a criminal complaint against a North Korean citizen for conspiracy to ‘conduct multiple destructive

Read More
18 Sep 2018

German Troops Face Russian ‘Hybrid War’ in Lithuania: Merkel

Germany is increasing its military cyber capabilities, according to Chancellor Angela Merkel, in response to Russian cyber attacks against its troops in Lithuania, NATO’s eastern flank. “Hybrid warfare is not something that we are very used to. You clearly experience this here in very specific wakes…it’s not for nothing that

Read More
17 Sep 2018

Companies Wary of Cyberattacks, Phishing During Hurricanes

Disruptions caused by natural disasters make organizations more vulnerable to cyberattacks, a reality that has many companies scrambling to ensure asset security as Hurricane Florence forces them to move computers, switch to backup networking equipment, and other non-routine practices that provide would-be hackers weak points to target. Experts point out

Read More