Please turn on your JavaScript for this page to function normally.
New York State
Proposed cyber security requirements for New York State seem to be more of the same

This month, New York State Governor Andrew Cuomo announced proposed regulation that requires banks, insurance companies, and other financial services institutions regulated by …

USA flag
Cybersecurity is not receiving enough attention from presidential candidates

Heading into the first presidential debate, 58 percent of Americans feel the presidential candidates are not paying enough attention to cybersecurity, according to LifeLock. …

USA flag
US elections and the hacking of e-voting machines

As the day when US citizens cast a vote for their preferred presidential nominee quickly approaches, the issue of whether the actual voting process can be tampered with is a …

GCHQ
Can an automated defence network protect Britain from low-level threats?

A recent Freedom of Information request found that the number of breaches reported to the ICO in the last 12 months has nearly doubled from the previous year, so something …

Stingray
Stingray use lacks transparency and meaningful oversight

Cell-site simulators – aka Stingrays, aka IMSI catchers – are widely used by US law enforcement, usually without a warrant that such type of surveillance should …

Arrest
Two arrested for allegedly hacking senior US government officials

Andrew Otto Boggs, aka INCURSIO, and Justin Gray Liverman, aka D3F4ULT, were arrested on charges related to their alleged roles in the computer hacking of several senior US …

Berlin
German Federal Intelligence Service violates laws, dodges supervision

The German Federal Intelligence Service (BND) has been illegally collecting data through mass surveillance tools, storing it in databases that should not exist, and has …

success
How the digital revolution is transforming the US federal government

The digital revolution is dominating and transforming the work of the US federal government, and those federal agencies that develop a people first approach will stand out in …

analytics IT assets
Feds are using big data analytics for cybersecurity, but is it effective?

81 percent of Feds say their agency is using big data analytics for cybersecurity in some capacity – 53 percent are using it as a part of their overall cybersecurity strategy …

Apple iOS 9
Apple plugs three actively exploited iOS zero-days

Owners of Apple’s mobile devices are advised to upgrade to iOS version 9.3.5 as soon as possible, as it fixes three zero-day vulnerabilities actively exploited in the …

NSA
Leaked hacking tools can be tied to NSA’s Equation Group

The batch of data released by the Shadow Brokers, an entity that claims to have hacked the Equation Group, contains attack tools that can be tied to the group. Equation Group …

cloud
Should cloud vendors cooperate with the government?

More than one in three IT pros believe cloud providers should turn over encrypted data to the government when asked, according to Bitglass and the Cloud Security Alliance …

Don't miss

Cybersecurity news