Cybersecurity

Sponsored
by

Cybersecurity / Most Viewed

Ukraine’s Power Outage Due to Cyberattack, Says Country’s National Power Company

A power blackout in Ukraine's capital Kiev last month was caused by a cyber attack, according to Ukraine's National power company, Ukrenergo which hired investigators to help it determining the cause. more

U.S. Cyber Command to Split Off from NSA

The Unites States is finalizing plans to revamp the nation’s military command for defensive and offensive cyber operations in hopes of intensifying America’s ability to wage cyberwar against the Islamic State group and other foes, according to U.S. officials. more

Expect More Malware Threats Exploiting the Financial Crisis, Warn Experts for 2009

Continued exploitation of the financial crisis to scam users with fake financial transactions services, fake investment firms, and fake legal services is the top trend to emerge for 2009 according threat predictions by McAfee. "Computer users face a dangerous one-two punch today," said Jeff Green, senior vice president of McAfee Avert Labs, McAfee's research group. "The current economic crisis is delivering a blow to our financial well-being, while malware authors are taking advantage of our distraction to deliver a roundhouse strike." more

Interpol Joining ICANN’s Governmental Advisory Committee as an Observer

Kevin Murphy reporting in DomainIncite: "Interpol plans to apply to join ICANN's Governmental Advisory Committee as an observer, according to ICANN. The news came in a press release this evening, detailing a meeting between ICANN president Rod Beckstrom and Interpol secretary general Ronald Noble. The meeting 'focused on Internet security governance and enhancing common means for preventing and addressing Internet crime'." more

ANA: Concerns About ICANN’s New gTLD Plans Growing and Very Serious

In a recent blog post, Dan Jaffe, Association of National Advertisers' Executive VP of Government Relations, shares some concerns about ICANN's "overly rapid Top Level Domain rollout". more

US DMCA Rules Updated - Now Legal to Hack Devices, Cars, Video Games, If Done in ‘Good Faith’

The U.S. government has released an updated version of the Digital Millennium Copyright Act (DMCA), adding a list of new exemptions that will protect cybersecurity professionals from prosecution over reverse-engineering of products for research purposes. more

Good Internet Hygiene During the COVID-19 Pandemic

We are all aware of the steps for mitigating the spread of the novel coronavirus (COVID-19): Wash your hands; Practice social distancing; Report exposure.But these are not the only activities to practice right now. Cyber-criminals are taking advantage of this health crisis and the emotional upheaval it creates to perpetrate their crimes. Therefore, we also need to exercise good internet hygiene. In a time of crisis or tragedy, bad actors don't slow down; their efforts amplify. more

Obama Proposes $19 Billion for Cybersecurity in Final Budget Plan

President Obama is seeking a 35 percent increase in cybersecurity funding in his final budget to boost the capability of the federal government to defend itself against cyberattacks, reports Ellen Nakashima in the Washington Post. more

The Privacy Shield Governing EU-US Data Flows Gets European Approval

"EU-U.S. commercial data transfer pact clears final hurdle," Julia Fioretti today reported in Reuters: "A commercial data transfer pact provisionally agreed by the EU executive and the United States in February received the green light from EU governments on Friday." more

Can Zero Trust Security Put an End to Human Security Weaknesses?

How bad is the human security weakness problem? Verizon's 2022 Data Breaches Investigations Report says 82 percent of data breaches have human involvement. This involvement can mean misconfigurations, poor security policy implementation, negligence, and falling prey to social engineering schemes. Essentially, a vast majority of data breaches have penetrated cyber defenses because of human carelessness, inconsistencies, and gullibility. more

Bangladesh Central Bank Governor Quits Amidst One of the Largest Cyber Heists

Bangladesh's central bank governor has resigned today amidst theft of $81 million from the bank's U.S. account, as details emerged in the Philippines that $30 million of the money was delivered in cash to a casino junket operator in Manila. more

The Internet’s Legitimacy Gap: When Governance Outgrew Its Architecture

Internet governance is shifting from participatory forums to security-driven mandates. As authority accelerates ahead of legitimacy, technical systems face growing instability and operators absorb the risks of politically motivated control. more

Cyber Threats Accelerate: 94% of Web Browser Exploits Occur Within 24 Hours of Disclosure

Today X-Force, IBM's security research and development arm, released its 2008 Midyear Trend Statistics report that indicates cyber-criminals are adopting new automation techniques and strategies that allow them to exploit vulnerabilities much faster than ever before. The new tools are being implemented on the Internet by organized criminal elements, and at the same time public exploit code published by researchers are putting more systems, databases and ultimately, people at risk of compromise. more

Security Researchers Uncover Cyber Espionage Network Invloving 103 Countries

A report released over the weekend by Information Warfare Monitor along with an exclusive story by the New York Times, revealed a 10-month investigation of a suspected cyber espionage network (dubbed GhostNet) of over 1,295 infected computers in 103 countries. 30% of the infected computers are labeled as high-value targets, including ministries of foreign affairs, embassies, international organizations, news media, and NGOs. Greg Walton, editor of Information Warfare Monitor and a member of the Toronto academic research team that is reporting on the spying operation, writes... more

Hacked ICANN Data Still Selling on Black Market Years After Breach

"Three years after hackers used a spearphishing attack to successfully gain access to internal data at the Internet Corporation for Assigned Names and Numbers (ICANN), the data is still being passed around and sold on black markets for $300, complete with claims that it’s never been leaked before," reports Patrick O'Neill in CyberScoop. more