10 Dec 2018

Stopping the Cybersecurity Brain Drain Calls for Outside the Box Thinking

President Trump’s National Cyber Strategy includes the development of a “superior cyber workforce.” But given the difficulty in recruitment and retention of skilled cyber personnel, this goal may remain illusive. According to the Commerce and Homeland Security departments, there were around 299,000 openings for cybersecurity positions in August 2017, positions

Read More
10 Dec 2018

Automated License Plate Tracking: Who’s Tracking and Sharing Your License Plate Movement?

Automated license plate reading technology has widely implemented across American cities, which has enabled driver tracking to an increasingly detailed extent. In 2016 and 2017, 173 local and federal entities scanned 2.5 billion license plates. To law enforcement, this allows cars to be flagged, added to a hot list, and easily

Read More
10 Dec 2018

Australia Anti-Encryption Law Triggers Sweeping Backlash

“A controversial Australian bill, which could give the government access to data protected by end-to-end encryption, was passed Thursday. The bill, called the Assistance and Access Act, empowers Australian police to essentially force companies (that are operating in the country) to help the government hack into systems, plant malware or

Read More
06 Dec 2018

FBI: Watch out for Iranian SamSam malware

DHS and the FBI shared a joint alert on December third regarding the critical infrastructure threat posed by the Iranian SamSam virus. The ultimate purpose of the virus is the successful intrusion and takeover of a network for the purpose of extorting a ransom (ransomware). The alert recommended strong passwords,

Read More
04 Dec 2018

The Biggest Data Breaches Of All Time, Ranked

News of new data breaches splash across the headlines on a seemingly weekly, if not daily, basis. Marriott’s loss of personal information from around 500 million guests is the most recent and one of the most largest. But how does it stack up against others by sheer numbers? This Nextgov

Read More
04 Dec 2018

Threat from Islamic State-Affiliated Group Reason DRC US Embassy Closed

The U.S. Embassy in the Democratic Republic of the Congo has been closed for over a week due to “credible” terror threat against U.S. government facilities in the capital. The nature of the threat was previously unspecified, but a U.S. official speaking with VOA under the condition of anonymity has

Read More
03 Dec 2018

Cryptomining software could be used to steal corporate secrets

“Even though cryptocurrency prices have fallen, cybercriminals could still take advantage of mining software, and not for the reasons you think. Instead of creating alternative currencies, cryptomining software could be used for a more sinister attack that could steal corporate secrets, according to Troy Kent, a threat researcher at Awake

Read More
03 Dec 2018

Pegasus Spyware Targets Investigative Journalists in Mexico

“Colleagues of slain Javier Valdez Cárdenas, known for investigating drug cartels, were targeted just days after his death. Of six messages analyzed (though more were received), several contained links shortened with bit.ly that ultimately pointed to known exploit URLs, while others included links directly containing previously–identified NSO Group exploit domains.

Read More
28 Nov 2018

Half of all Phishing Sites Now Have the SSL Padlock

Once recommended as a sign of online safety, data suggests that around half of all phishing websites in Q3 2018 boasted the SSL padlock security icon next to its domain name, an increase of 35% over Q2. A likely reason for the increase is that users strongly associate the icon

Read More
26 Nov 2018

CBP’s Facial Biometrics Program Has Caught 26 Alleged Imposters

Custom’s and Border Protection officials have reported 26 cases of facial biometrics technology catching imposters from entering the country since its rollout this summer. The technology compares the passport photo of the traveler with facial recognition technology on-site, and identifies individuals that do not match and require closer investigation or

Read More