13 Jul 2016

White House releases plan to boost cyber workforce

“The cybersecurity challenge has a number of dimensions, not the least of which is finding enough qualified people who truly understand the problem and potential solutions. But the administration has a plan.” Source: White House releases plan to boost cyber workforce

Read More
13 Jul 2016

FBI Agent: Decrypting Data ‘Fundamentally Alters’ Evidence

“An FBI agent has brought up an interesting question about the nature of digital evidence: Does decrypting encrypted data ‘fundamentally alter’ it, therefore contaminating it as forensic evidence? According to a hearing transcript filed last week, FBI Special Agent Daniel Alfin suggested just that.” Source: FBI Agent: Decrypting Data ‘Fundamentally

Read More
13 Jul 2016

Researchers Found a Hacking Tool that Targets Energy Grids on the Dark Web

“A sophisticated piece of government-made malware, designed to do reconnaissance on energy grid’s system ahead of an eventual cyberattack on critical infrastructure, was found on a dark web hacking forum.” Source: Researchers Found a Hacking Tool that Targets Energy Grids on the Dark Web | Motherboard

Read More
13 Jul 2016

Who Hacked Sony Pictures? Two Years Later, No One’s Really Sure

” On November 24, 2014, an ominous message appeared on all the computers of the employees of Sony Pictures Entertainment in California. ‘Hacked by #GOP,’ read the title of the message, which had a red skeleton in the background.” Source: Who Hacked Sony Pictures? Two Years Later, No One’s Really

Read More
09 Jul 2016

Facebook tests ‘secret message’ service

“Private messages that can disappear are being trialled by Facebook as it experiments with a new option for those using its Messenger app.” Source: Facebook tests ‘secret message’ service – BBC News

Read More
09 Jul 2016

In the Future, Hackers Will Build Zombie Armies from Internet-Connected Toasters

“Cybercriminals are finally leveraging the thousands or millions of insecure devices in the so-called Internet of Things to launch cyberattacks. Earlier this week, someone used a botnet made of more than 25,000 hacked CCTV cameras to launch a massive cyberattack on a jewelry store’s website.” Source: In the Future, Hackers

Read More
08 Jul 2016

Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites

“When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the traffic is coming from or going to, the final hop in the network (known as an exit node) gets to know

Read More
07 Jul 2016

Darpa Goes Full Tron With Its Grand Battle of the Hack Bots

“All this is dress rehearsal for a $55 million hacking contest put on by Darpa, the visionary research wing of the US Defense Department. The contest is called the Cyber Grand Challenge, and it’s set for early August. Seven teams will compete inside seven supercomputers erected in a ballroom at

Read More
07 Jul 2016

Criminals winning ‘cyber arms race’

“Businesses and law enforcement agencies are losing the ‘cyber arms race’ with online criminals, the UK’s National Crime Agency has warned.” Source: Criminals winning ‘cyber arms race’ – National Crime Agency – BBC News

Read More
07 Jul 2016

Cyber attacks to surge at Olympics, Israeli security firm warns

“Studying previous sporting events through its intelligence analysis platform, Tel Aviv-based Cytegic, a cybersecurity company, has identified a surge of cyber activity ahead of and during major global sporting events. This same activity is expected to surge in the weeks ahead of and during the Olympics in Brazil in August

Read More