Russian authorities have announced hat they “took measures to detect and foil attempts by terrorists to use drones during the preparation and hosting of various major political and sports events, most of all during the soccer World Cup.” The officials have not provided details regarding the identify of the alleged
Bahrain is a Shia majority country with a Sunni ruling family. Since 2012, the government has revoked citizenship from at least 741 people. While the government cites terrorism, and this May revoked the citizenship of 115 in a mass terrorism trial, activists highlight the practice as a way to silence
“A Department of Defense official said Nov. 1 that U.S. Cyber Command needs to have its own infrastructure and not lean as heavily on the National Security Agency for some cyber tools, a transition that may foreshadow an eventual split between the two dual-hatted agencies. Cyber Command has operated on
“The intelligence community wants to make the spaces government officials use to review and discuss sensitive information impervious to digital spying. The Intelligence Advanced Research Projects Activity plans to fund research to further lock down sensitive compartmented information facilities, or SCIFs, against enemy surveillance and insider threats. SCIFs are built
“Thousands of sensitive documents pertaining to nuclear power plants, prisons and tram networks have been stolen from the servers of a French company in a cyberattack, German and French media have reported Friday. A spokeswoman from Ingerop quoted by NDR said more than 11,000 files from a dozen projects were
A democracy watchdog group Freedom House has published a report indicating that China is exporting its internet policy and surveillance methods and tools to emerging market countries, essentially exporting a “digital authoritarianism” that could pose an existential threat to weak democratic governance around the world. The report suggests that countries
“Passengers at some European airports will soon be questioned by artificial intelligence-powered lie detectors at border checkpoints, as a European Union trial of the technology is set to begin. Fliers will be asked a series of travel-related questions by a virtual border guard avatar, and artificial intelligence will monitor their
Steganography and a New Covert Messaging Technique? Complete Works Of Shakespeare Hidden Inside Twitter Thumbnail Image
A researcher has embedded the complete works of William Shakespeare in an image that he has distributed on Twitter. From the file, even the thumbnail image, the embedded file containing the works can be accessed. Embedding hidden information and messages inside objects or images that are not secret is known
When somebody holds the same job for 30 years before applying for a security clearance, the government agents working on their security clearance verification will likely require a significantly shorter time than somebody agents working on a case for an individual who has worked for a long list of companies.
A new report from F5 labs indicates that Internet-of-Things (IoT) devices are now the most common target for cyber criminals, individuals and groups that continue to respond to improved security developments. IoT devices are projected to grow in number from 8.4 billion in 2017 to over 20 billion by 2020.