14 Aug 2018

Russian Military Spy Software is on Hundreds of Thousands of Home Routers

“The Russian military is inside hundreds of thousands of routers owned by Americans and others around the world, a top U.S. cybersecurity official said on Friday. The presence of Russian malware on the routers, first revealed in May, could enable the Kremlin to steal individuals’ data or enlist their devices in

Read More
14 Aug 2018

Experts question the benefit of proliferating cybersecurity offices

A long series of state agencies and departments have been founded to secure U.S. programs, assets, and operations, but some experts are arguing that this has generated more confusion than security as the government has not worked to coordinate private sector capabilities. Problems of information sharing and overlapping agendas have

Read More
14 Aug 2018

Hackers Target Marines for Pentagon’s Latest Bug Bounty

A live hacking event in Las Vegas is targeting the Marine Corps in the Pentagon’s latest bug bounty program. Around 100 hackers were selected to identify vulnerabilities in the Corps’ primary communications network. Over the nine-hour event, hackers found 75 vulnerabilities and won $80,000 in bounties. “Working with the ethical

Read More
13 Aug 2018

Fax Machines Are Still Everywhere, and Wildly Insecure

“It’s tempting think of fax machines as a relic, every bit as relevant as an eight-track tape. But fields like health care and government still rely on faxes every day. Even your all-in-one printer probably has a fax component. And new research shows that vulnerabilities in that very old tech

Read More
13 Aug 2018

How long is too long for a cyber operation? NSA has an idea

“Research conducted by the National Security Agency has found that after five hours of cyber operations, performance drops and frustration begins to increase among staffers. Those longer missions caused roughly 10 percent more fatigue and frustration compared to operations that lasted less than five hours, Celeste Paul, a senior researcher

Read More
13 Aug 2018

This Guy Hacked Hundreds Of Planes From The Ground

A cybersecurity researcher used antennas to access large troves of data from airplanes flying overhead. While segmentation prevented access to navigation and other important features, the hackers was able to access important information and even locate a number of supposedly hidden military bases. While many of the vulnerabilities have been

Read More
13 Aug 2018

Hackers Could Cause Havoc By Pwning Internet-Connected Irrigation Systems

“Hackers could mess with a city’s water supplies without attacking its critical infrastructure directly, but instead targeting its weakest link: internet-connected sprinklers, researchers warn in a new academic study. The researchers studied three different Internet of Things devices that help control irrigation and found flaws that would allow malicious hackers

Read More
13 Aug 2018

The Sensors That Power Smart Cities Are a Hacker’s Dream

“Smart” cities are built on a foundation of sensors that regulate traffic lights, radiation sensors, and water levels. These sensors allow for data aggregation and powerful analysis to improve operations, but also pose a high risk of manipulation. These targets are also the focus of many nation state attackers, with

Read More
08 Aug 2018

German cyberwarriors assert right to ‘hack back’ when attacked

“German authorities believe they are on firm legal footing to retaliate against cyber attacks by unleashing digital or conventional counterattacks, according to a series of recent written responses by government officials to lawmakers. The documents shed light on some of the legal considerations of cyber-warfare mulled in Berlin, just as

Read More
08 Aug 2018

Why small cyberattacks on power systems more likely than a long-running blackout

“Attacks on American power systems are likely to be small and localized, according to a cybersecurity firm, casting doubt on the ability of a foreign power to take down broad swaths of U.S. electric systems at once. Given current technology it is not reasonable to expect an enemy to shut

Read More