TALLINN, Estonia (AP) — About 400 computer experts will participate in a major cybersecurity drill in Estonia this week as part of NATO’s efforts to upgrade its capability to counter potentially debilitating hacker attacks.
North Korea’s cyberattack on Sony Pictures exposed a new reality: you don’t have to be a superpower to inflict damage on U.S. corporations The following script is from “The Attack on Sony” which aired on April 12, 2015. Steve Kroft is the correspondent. Graham Messick, producer.
In light of the latest global surveillance leaks on Thursday by former U.S. government contractor Edward Snowden, scanners at U.S. airports that catalog you in full birthday-suit glory seem somewhat tame.
We had been noting, in the wake of the Charlie Hebdo attacks in France, how the country that then held a giant “free speech” rally appeared to be, instead, focusing on cracking down on free speech at every opportunity. And target number one: the internet.
New and subtle business models are emerging for cybercriminals, boosting their sales of stolen data and offering new ways to inflict damage on target organisations. Hackers are commercialising stolen data by selling it back to legitimate businesses, one security expert has warned.
A total of 1,228 popular Android apps found in the Google Play store are still vulnerable to a FREAK attack, FireEye says. Research published on Tuesday by the firm’s security team disclosed just how vulnerable both Android and iOS apps still are to the FREAK bug.
In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails. In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails.
Lenovo is selling computers that come preinstalled with adware that hijacks encrypted Web sessions and may make users vulnerable to HTTPS man-in-the-middle attacks that are trivial for attackers to carry out, security researchers said.
Islamic State militants are planning the creation of a ‘cyber caliphate’ protected by their own encryption software – from behind which they will launch massive hacking attacks on the U.S. and the West.
Next week at the 31st Chaos Communication Congress (31C3) in Hamburg, programmer/hacker Trammell Hudson will present research on ways to infect Apple EFI (Extensible Firmware Interface) firmware using the externally accessible Thunderbolt ports.
Thank you for visiting USSPI. The U.S. Strategic Perspective Institute is an independent, non-partisan, 501(c)3 non-profit, public policy think tank devoted to helping America solve some of its toughest operational problems including jobs, international competition, healthcare, the environment, government transparency, and cybersecurity.
Please join our mailing list. If you subscribe, you will be asked to confirm your subscription. You promise to contact you only when it is important. You will be able to unsubscribe at any time.
This form will only be shown once during this session. Thanks!