Tag: Cybersecurity
The European parliament voted on Wednesday to fine firms like Facebook, Google and Twitter up to 4 percent of their turnover if they persistently fail to remove extremist content within one hour of being asked to do so by authorities. …
The National Cyber Security Centre (NCSC), together with Wayra UK, has launched a national call for 10 startups to join its accelerator programme to develop the next generation of cyber security products. Since its launch in 2017, the government-funded NCSC Cyber Accelerator has …
The TajMahal spyware includes more than 80 distinct spy tools, and went undetected for five years. IT’S NOT EVERY day that security researchers discover a new state-sponsored hacking group. Even rarer is the emergence of one whose spyware has 80 distinct …
Google has announced 30 new features or enhancements of its Google Cloud platform that are designed to improve the ability of organizations to manage security not only for the Google platform, but other cloud-based services and applications as well. “The …
For the past several years, an increasing number of cyberecrime groups have adopted techniques and procedures traditionally used by state-sponsored actors. This trend has caught many organizations unprepared, especially small and medium-sized businesses whose defenses are generally focused on regular …
First came small businesses, and now it’s election folks and journos up for cybersecurity toolkits. Also on deck for help: aspiring cyber pros who can swap federal service for scholarships. — A Senate panel today explores implementation of a law that …
GPS rollover this weekend — NATO launches live exercise next week MO’ MONEY, MO’ PROBLEM-SOLVERS — Cyberattacks represent “a significant challenge” that “exceeds the bandwidth that we have at the moment,” FBI Director Christopher Wray told House lawmakers Thursday during …
Catch up on the most important tech news today in two minutes or less. Change your Facebook password. Facebook acknowledged a bug that caused hundreds of millions of user passwords (dating back to 2012) for both Facebook and Instagram to …
Cybersecurity is a top concern for boards of directors. Don’t let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. In fact, 42% of the nearly 500 leaders surveyed …
This is a story of how a career setback turned out to be a setup for something bigger. It was the year 2000, and I had just gone through a layoff. I was a network engineer and felt I needed …
Hackers likely controlled by Russia are stepping up efforts to disrupt Ukraine’s presidential election in March with cyber attacks on electoral servers and personal computers of election staff, the head of Ukraine’s cyber police said on Friday. Serhiy Demedyuk told …
The majority of UK IT security professionals feel that they are underrated by their fellow workers and employers, according to a study commissioned by privileged access management firm Thycotic. Nearly two-thirds of respondents (63%) feel that their security teams are either viewed as …
The U.S. intelligence community and the Pentagon have quietly agreed on the outlines of an offensive cyberattack that the United States would unleash if Russia electronically interferes with the 2018 midterm election on Nov. 6, according to current and former …
Twitter accounts linked to what has been called a Russian “troll farm” engaged in influence operations to stir division over Islam in the U.K., a new study has found. Research by British social policy think tank Demos found that the vast majority of tweets …
It’s lowkey one of the biggest problems in all of cybersecurity: Deploying a skilled workforce in the face of an overwhelming gap. With that in mind, a paper from the New America think tank out this morning proposes creating a national, volunteer …
Microsoft added a cool, new feature to Microsoft Windows client and server products. Controlled Folder Access gives you another way to mitigate the impact of ransomware. Of course, you should enable with careful testing and custom configuration because it will …
Call of Duty — it’s all fun and games until it’s not — and a gamer gets threatened with being swatted unless he cooperates with a “gang” of cyber thugs by helping to steal cryptocurrency. That’s the gist of what one Call …
IN DECEMBER, RESEARCHERS spotted a new family of industrial control malware that had been used in an attack on a Middle Eastern energy plant. Known as Triton, or Trisis, the suite of hacking tools is one of only a handful of known cyberweapons …
President Donald Trump this weekend talked about cybersecurity and election interference at two separate events. Here’s a bit of an annotation of his remarks from Friday in Scottsdale, Ariz. — Asked about Friday’s unsealed indictment of a Russian woman charged …
The upper ranks of corporate security are seeing a high rate of change as companies try to adapt to the evolving threat landscape. Many companies are hiring a chief security officer (CSO) or chief information security officer (CISO) for the …