The following articles have been curated by USSPI experts and represent information we think is interesting and important. It should be noted that we do not necessarily agree with or endorse the information in these articles, but we do think you’ll benefit from reading them.
In the summer of 2014, Craig Diangelo thought he was on the path to an easy retirement. A veteran of the tech industry, Diangelo got his start as a COBOL programmer in the 1970s.
Posted on: April 25, 2017 6:45 pm
The United States comes up constantly when you talk to Russians about their country’s place in the world. But the conversations tend to go a lot differently than many Americans might expect.
Posted on: May 4, 2015 7:54 pm
THE COLONY, TX–Many people vent online, but a Facebook post cost one Texan her job. Kaitlyn Walls was excited to find work; however, she was not as excited about her place of employment, which was a daycare center in Texas. Walls says she’s a single mother and was trying to get out on her own.
Posted on: May 4, 2015 12:15 pm
TALLINN, Estonia (AP) — About 400 computer experts will participate in a major cybersecurity drill in Estonia this week as part of NATO’s efforts to upgrade its capability to counter potentially debilitating hacker attacks.
Posted on: April 24, 2015 11:30 am
If you’ve ever wondered what a government has left in its last breath of an argument it’s already lost, it’s almost certainly going to have something to do with “national security.
Posted on: April 23, 2015 2:14 pm
North Korea’s cyberattack on Sony Pictures exposed a new reality: you don’t have to be a superpower to inflict damage on U.S. corporations The following script is from “The Attack on Sony” which aired on April 12, 2015. Steve Kroft is the correspondent. Graham Messick, producer.
Posted on: April 19, 2015 11:03 pm
More Americans dropped out of the labor force last month, as the number of people not in the labor force hit another record high in March.
Posted on: April 6, 2015 1:05 pm
The NSA may not be listening to your private phone calls, but it has been watching your private parts
In light of the latest global surveillance leaks on Thursday by former U.S. government contractor Edward Snowden, scanners at U.S. airports that catalog you in full birthday-suit glory seem somewhat tame.
Posted on: April 6, 2015 12:23 pm
US declares cybercrime a ‘national emergency’, threatens sanctions against hackers, online espionage
The White House has set out plans to use economic sanctions against cyber attackers and companies that benefit from the online theft of secrets.
Posted on: April 1, 2015 4:17 pm
We had been noting, in the wake of the Charlie Hebdo attacks in France, how the country that then held a giant “free speech” rally appeared to be, instead, focusing on cracking down on free speech at every opportunity. And target number one: the internet.
Posted on: March 19, 2015 12:17 pm
New and subtle business models are emerging for cybercriminals, boosting their sales of stolen data and offering new ways to inflict damage on target organisations. Hackers are commercialising stolen data by selling it back to legitimate businesses, one security expert has warned.
Posted on: March 19, 2015 7:37 am
A total of 1,228 popular Android apps found in the Google Play store are still vulnerable to a FREAK attack, FireEye says. Research published on Tuesday by the firm’s security team disclosed just how vulnerable both Android and iOS apps still are to the FREAK bug.
Posted on: March 18, 2015 12:33 pm
In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails. In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails.
Posted on: March 9, 2015 12:10 pm
The year of EMV migration is finally upon us, and for small merchants in the US, that means significant changes when it comes to payments.
Posted on: March 6, 2015 10:58 pm
Like a subgroup of the Internet of Things, connected toys are the new generation of children’s toys – often using Wi-Fi and an iOS or Android-based remote control to manage and manipulate a car, quadcopter, or Lego robot.
Posted on: February 27, 2015 2:22 pm
When it comes to data breaches, retailers are one of the biggest targets these days, and today we have some detail on the costs around one of the more high-profile attacks.
Posted on: February 27, 2015 1:07 am
(Reuters) – Health insurer Anthem Inc, which earlier this month reported that it was hit by a massive cyberbreach, said on Tuesday that 8.8 million to 18.8 million people who were not its customers could be victims in the attack.
Posted on: February 25, 2015 2:34 pm
SIM card maker Gemalto has confirmed that its network was hacked – probably by the NSA and GCHQ – but said the breach could not have resulted in a massive theft of encryption keys.
Posted on: February 25, 2015 2:09 pm
Gemalto presents the findings of its investigations into the alleged hacking of SIM card encryption keysGemalto presents th
Amsterdam, February 25, 2015 – Following the release of a report by a news website on February 19, 2015, Gemalto (Euronext NL0000400653 GTO), has conducted a thorough investigation, based in particular on two elements: the purported NSA and GCHQ documents which were made public by this website,
Posted on: February 25, 2015 1:40 pm
Lenovo is selling computers that come preinstalled with adware that hijacks encrypted Web sessions and may make users vulnerable to HTTPS man-in-the-middle attacks that are trivial for attackers to carry out, security researchers said.
Posted on: February 19, 2015 11:43 am