0 Comments
Three U.S. presidents have issued directives over the past 21 years on critical infrastructure protection of the natural and man-made resources the U.S. depends on to function, as well as the systems needed for their delivery and protection. Because all critical assets are not controlled by the federal government, President Bill Clinton in 1998 first laid
0 Comments
A new version of the advanced malicious surveillance tool, FinSpy, has been observed stealing information from global governments, law enforcement and NGOs, according to new research from Kaspersky. “The new implants work on both iOS and Android devices and can monitor activity on almost all popular messaging services, including encrypted ones, and hide their traces better
0 Comments
In early May, hackers infiltrated the Baltimore, Md., computer network. The ransomware attack ended normal business operations, interrupted critical city services, cost the city millions and inconvenienced hundreds of thousands of residents. Baltimore joined the list of other cities that have fallen victim to serious ransomware threats that affect business and commerce. While ransomware attacks
0 Comments
ESET research discovers a zero-day exploit that takes advantage of a local privilege escalation vulnerability in Windows In June 2019, ESET researchers identified a zero-day exploit being used in a highly targeted attack in Eastern Europe. The exploit abuses a local privilege escalation vulnerability in Microsoft Windows, specifically a NULL pointer dereference in the win32k.sys
0 Comments
Zoox CTO and co-founder Jesse Levinson revealed a few more details today about the company’s autonomous vehicle hardware, which it’s designing along with its software stack from the ground up. Levinson told us onstage at TC Sessions: Mobility that Zoox’s vehicle will have fully independent active four-wheel suspension — a design detail that will translate
0 Comments
The Information Commissioner’s Office has announced an intention to fine Marriott International £99m for “infringements of the GDPR.” Relating to an incident that Marriott reported in November 2018, which saw approximately 339 million guest records exposed globally, of which around 30 million related to residents of 31 countries in the European Economic Area (EEA) and
0 Comments
Cyber threat intelligence has become a critical tool for organizations trying to defend their networks. A 2019 survey from the cybersecurity-focused SANS Institute found that 72% of survey respondents are either consuming or producing cyber threat intelligence (CTI). Only 8% say they don’t use it and have no plans to start. Yet how well organizations
0 Comments
As a U.S. cybersecurity company, McAfee supports legislation that aims to safeguard U.S. election security. After the 2016 election, McAfee sees the importance of improving and preserving election security; we even offered free security tools to local election boards prior to the 2018 elections and released educational research on how localities can best protect themselves
0 Comments
Against a backdrop of rising violence against religious minorities around the world, Twitter today said that it would update its hateful conduct rules to include dehumanizing speech against religious groups. “After months of conversations and feedback from the public, external experts and our own teams, we’re expanding our rules against hateful conduct to include language that dehumanizes others
0 Comments
The Department of Energy (DOE) engaged in conversations with industry partners in order to advance the cybersecurity of industrial control systems in the nation’s critical infrastructure, including power utilities and pipelines, according to FedScoop and E&E News. “Private entities and key agencies formed a consortium over concerns industrial control systems (ICS) are increasingly being targeted by
0 Comments
Although there is some debate over the value of certain security certification programs, most of them can deliver… more significant benefits to professionals than the traditional self-study options. A certification, for instance, covers topics that are broader than purely the interest of the student, which requires the student to learn more than just the minimum
0 Comments
by Danny Bradbury Hackers just infiltrated virtual reality (VR), enabling them to manipulate users’ immersive 3D worlds. At the Recon cybersecurity show in Montreal, researchers Alex Radocea and Philip Pettersson demonstrated how to hack virtual reality worlds on three platforms. The first was VR Chat, a virtual chat room available via online gaming platform Steam
0 Comments
In the 17th century, poet John Donne wrote, “no man is an island entire of itself.” He also mentioned every man is “a part of the main.” Fast forward to the 21st century and you’ll find this concept still rings true, especially as it relates to security. Like everything else in the world, the security
0 Comments
Britain’s Information Commissioner’s Office (ICO) today hit British Airways with a record fine of £183 million for failing to protect the personal information of around half a million of its customers during last year’s security breach. British Airways, who describes itself as “The World’s Favorite Airline,” disclosed a breach last year that exposed personal details