In a presentation at the multilateral action on sensitive technologies (MAST) conference, US State Department official Ashley Ford last week outlined why the US government’s security worries about Huawei go way beyond the ongoing trade war between the US and China. In May of this year, US President Donald Trump
Threat actors are actively exploiting a security weakness in SIM cards in order to covertly collect the location information of thousands of users, new research by AdaptiveMobile Security shows. The firm warns that the Simjacker attack, which involves sending malicious SMS messages to vulnerable devices, may put over 1 billion
Symantec warns that in the past year, Chinese cyber-espionage group Thrip has launched successful campaigns against no less than 12 military, telecom and satellite organizations across Southeast Asia. Evidently, a 2018 report by Symantec detailing Thrip’s activities has done little to deter the group. Thrip has adopted new malware in
This is the second of a series on our nation’s most neglected critical infrastructure, our cognitive infrastructure. The first post dove into the nature of the challenge and why it is so important for our future that the threats to our cognitive infrastructure are understood and addressed. This post flows from that one and suggests ways the nation can mitigate many of these risks.
New ESET research reveals that Stealth Falcon, a cyber espionage group targeting political activists and journalists in the Middle East, has changed tactics and is currently using a backdoor relying on Windows Background Intelligent Transfer Service (BITS), instead of the PowerShell-based backdoor used by the group in previous campaigns. The
Apple on Friday slammed a recent Google report claiming that threat actors may have hacked into thousands of iPhones via an “indiscriminate” years-long campaign involving a number of malicious websites. According to Google, merely visiting one of the websites could have resulted in device exploitation along five different attack chains
A new report by Check Point indicates that Chinese state-backed hackers set deliberate traps to steal the NSA-linked cyber weapons that were leaked by the mysterious Shadow Brokers group in 2017. Earlier this year, Symantec already found evidence that Chinese cyber espionage group Buckeye (aka APT3, UPS Team, Gothic Panda,
Security researchers with Avast have discovered a range of critical flaws affecting around 600,000 GPS trackers designed for monitoring the location of children, seniors, and pets. The flaws include the presence of the same default password (123456) in all devices and the insecure transmission of data in plaintext. The vulnerabilities
Huawei on Tuesday accused the US government of carrying out cyberattacks on the firm’s networks and of unlawfully detaining and threatening its staff members. The Chinese tech giant did not provide evidence to support its claims, but stated that it “strongly condemn[s] the malign, concerted effort by the US government
The term quantum uncertainty refers to the unique property of not being able to know the direction and speed of a particle at the same time. However if you were in Washington DC area this summer quantum uncertainty could also describe the confusion of defining the quantum threat to national security and countermeasures to contain it. We imagine there may be quite a bit of quantum uncertainty in your business as well. In this post we bring a bit of clarity to this uncertainty and provide recommendations for both business strategists and government policy makers that can help prepare you for a quantum world.