22 Oct 2017

U.S. warns public about attacks on energy, industrial firms

“The U.S government issued a rare public warning that sophisticated hackers are targeting energy and industrial firms, the latest sign that cyber attacks present an increasing threat to the power industry and other public infrastructure.” Source: U.S. warns public about attacks on energy, industrial firms

Read More
20 Oct 2017

Quarter of emails claiming to be from feds are malicious, unauthenticated, says cyber firm

“Some 25 percent of emails claiming to be from the federal government are either unauthenticated or malicious, according to a new report from cybersecurity firm Agari.” Source: Quarter of emails claiming to be from feds are malicious, unauthenticated, says cyber firm

Read More
20 Oct 2017

DoD says it shouldn’t protect homeland from cyberthreats; McCain disagrees

“In a heated exchange before the Senate Armed Services Committee on Oct. 19, the committee’s chairman sparred with the Department of Defense’s principle cyber adviser over the Pentagon’s roles in protecting the nation in cyberspace.” Source: DoD says it shouldn’t protect homeland from cyberthreats; McCain disagrees

Read More
19 Oct 2017

Canada’s ‘super secret spy agency’ is releasing a malware-fighting tool to the public

“Canada’s electronic spy agency says it is taking the ‘unprecedented step’ of releasing one of its own cyber defence tools to the public, in a bid to help companies and organizations better defend their computers and networks against malicious threats. The Communications Security Establishment (CSE) rarely goes into detail about its activities

Read More
19 Oct 2017

India is quietly preparing a cyber warfare unit to fight a new kind of enemy

“Recently, Pakistani hackers compromised 10 Indian websites which included National Aeronautics, Army Institute of Management and Technology, Defence Institute of Advanced Technology, Army Institute of Management, and the Board of Research in Nuclear Sciences.” Source: Cybersecurity: India is quietly preparing a cyber warfare unit to fight a new kind of

Read More
19 Oct 2017

Jim Mattis says Senate bill hamstrings US cyber action

“Defense Secretary Jim Mattis has fired off letters to lawmakers listing his objections to the two versions of the 2018 National Defense Authorization Act, including his fear that language in the bill limits the ability of the U.S. to take decisive action against cyber threats.” Source: Jim Mattis says Senate

Read More
17 Oct 2017

Microsoft responded quietly after detecting secret database hack in 2013

“Microsoft Corp’s secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking group more than four years ago, according to five former employees, in only the second known breach of such a corporate database.” Source: Microsoft responded quietly after detecting secret database

Read More
17 Oct 2017

House Bill Would Allow Companies to Hack Back—With Limits

“Companies would have broader authority to fight back after hackers breach their networks and steal data under legislation introduced Friday by a bipartisan pair of House lawmakers. The Active Cyber Defense Certainty Act wouldn’t let companies return digital fire against their attackers by stealing or destroying files.” Source: House Bill

Read More
17 Oct 2017

DHS issues mandate for agencies to beef up their email, web security

“The Department of Homeland Security announced a binding operational directive (BOD) to all federal agencies, ordering them to enhance their email and web security through specific programs.” Source: DHS issues mandate for agencies to beef up their email, web security

Read More
16 Oct 2017

Millions of high-security crypto keys crippled by newly discovered flaw

“A crippling flaw in a widely used code library has fatally undermined the security of millions of encryption keys used in some of the highest-stakes settings, including national identity cards, software- and application-signing, and trusted platform modules protecting government and corporate computers. The weakness allows attackers to calculate the private

Read More