China is taking a page from the Pentagon's playbook under the Obama administration: it's partnering with tech companies to develop more cutting-edge weapons. But China's innovation-focused strategy could elevate the espionage risk to the U.S.
The White House’s first federal budget blueprint unveiled Thursday seeks to fund the nation’s cybersecurity efforts by boosting budgets of the U.S. Defense Department and Department of Homeland Security -- an initiative officials say will guard against the magnified threat landscape that is only getting worse.
The intelligence community uses undisclosed vulnerabilities to develop tools that can penetrate the computer systems and networks of its foreign targets. Unfortunately, since everyone uses the same technology in today’s global economy, each of these vulnerabilities also represents a threat to American businesses and individuals. In the future, rather than hoard this information, the CIA and other intelligence agencies should commit to responsibly disclosing vulnerabilities it discovers to the private sector so that security holes can be patched.
The Justice Department charged two Russian intelligence officers on Wednesday with directing a sweeping criminal conspiracy that stole data on 500 million Yahoo accounts in 2014, deepening the rift between American and Russian authorities on cybersecurity.
A lightbulb. We can connect a lightbulb in our house to the internet in case we need to turn the lights on or off while we’re away – or if we’re too lazy to walk to the light switch. The more lightbulbs, devices, apps and online services we use and connect with on a daily basis, the more we expose ourselves to security risks. This is the nature of how our digital lives have evolved and it requires more active participation as individuals to protect ourselves and minimize exposure.
A stretch of the Gulf Coast near Houston features one of the largest concentrations of refineries, pipelines and chemical plants in the country, and cybersecurity experts say it's an alluring target for espionage and other cyberattacks. "There are actors that are scanning for these vulnerable systems and taking advantage of those weaknesses when they find them," said Marty Edwards, director of U.S. Homeland Security's Cyber Emergency Response Team for industrial systems.
The trove appeared to lay bare the design and capabilities of some of the U.S. intelligence community’s most closely guarded cyberweapons, a breach that is likely to cause immediate damage to the CIA’s efforts to gather intelligence overseas and place new strain on the U.S. government’s relationship with Silicon Valley giants including Apple and Google.
The measure called for broadband providers to take "reasonable" measures to ensure the security of customer data. But critics said that it would have set up different requirements than privacy rules issued by the Federal Trade Commission (FTC). FCC Chairman Ajit Pai and acting FTC Chairwoman Maureen Ohlhausen issued a joint statement arguing that privacy should be returned to the FTC's jurisdiction.
Almost 20 years ago, Chris Wysopal was among a group of hackers who testified before U.S. Congress, warning it about the dangers of the internet. Unfortunately, the U.S. government is still struggling to act, he said. "You’re just going to keep ending up with the status quo," he said, pointing to the U.S. government's failure to regulate the tech industry or incentivize any change.
One in four U.S. consumers (26 percent) have had their personal medical information stolen from technology systems, according to results of a survey from Accenture released today at HIMSS2017 in Orlando. The findings show that half (50 percent) of those who experienced a breach were victims of medical identity theft and had to pay approximately $2,500 in out-of-pocket costs per incident, on average.