Are legislation and regulation a viable means of making people and organizations do better at securing data systems and devices? I’m not talking about FIAT the car maker, but fiat: “an official order given by someone who has power.” How’s that working in light of NIST CSF and HIPAA?
Governments around the world are recruiting “cyber warriors” to fight against the growing threat of both cybercrime and state-sponsored attacks – but there aren’t enough experts to go round.
A new cyber defense force is being set up in the UK to protect critical private and government computer networks from attack – “if necessary, to strike in cyberspace,” Britain’s Defense Secretary Philip Hammond has said.
New hi-tech cyber attacks could threaten energy supplies, “wearable” computers – and even medical implants, according to a study conducted by Europol’s European Cybercrime Centre (EC3) and the International Cyber Security Protection Alliance (ICSPA).
A hi-tech spoofing attack took “remote control” of a 213-foot yacht – steering it off course, without anyone touching the steering wheel.
NASA is no stranger to peering into nebulae in space – but the space agency found itself perplexed by the more Earthbound puzzle of cloud computing security, according to a report by the Office of the Inspector General.
What needs to happen before the President of the United States can stand before the American people and assure them that a comprehensive and good faith effort has been made to stop cyber attacks disrupting the delivery of essential goods and services? The NIST workshops are seeking answers to that question.
Browser security warnings can work to protect users from phishing and malware sites – but “warning fatigue” means important alerts over site security can be conmpletely ignored.
A new biometrics system could “read” blood vessels under the skin using thermal imaging cameras – a system which its inventors claim would be “almost impossible to spoof.”
A Kremlin security agency has ordered $15,000 of electric typewriters – sparking international gossip about a return to “old school” security measures.
Governments around the world are recruiting “cyber-mercenaries” – groups of skilled cyber professionals who target institutions such as banks and energy companies, British politicians have warned.
A U.S. Government department threw away IT components including printers, computer mice and keyboards in an effort to root out a “sophisticated” and “persistent” malware threat – which did not exist.
Cybercriminals have targeted U.S. energy companies with a wave of brute force cyber attacks, according to the Industrial Control Systems Emergency Response Team (ICS-CERT).
Every month, around 70 sophisticated cyber espionage campaigns target government or industry networks, Sir Iain Lobban, head of Britain’s GCHQ spy agency said.
Yahoo defended its plan to recycle inactive user IDs this week, saying that it had put in place safeguards to prevent the recycled usernames being used for identity theft.
A simulated cyber attack with the Hollywood-esque title Quantum Dawn 2 will bombard the defenses of American banks on June 28 – in an exercise designed to test how Wall Street would endure a sustained hi-tech assault.
The British government has launched the first stage of a £4 million ($6.1 million) campaign to educate consumers and small businesses about the dangers of cyber crime.
Cyber attacks are damaging the world economy, a former White House official has warned, and leading economies need to put aside political differences to deal with the threat.
British Prime Minister David Cameron has been warned that telecoms equipment made by Chinse firm Huawei should be tested by security services to protect against cyber attacks.
Designs for more than two dozen advanced weapons systems have been compromised by hackers, according to a report prepared for the Pentagon. The hackers are said to be Chinese.