One of the major drawbacks to the Internet of Things ecosystem and “smart” devices more generally is the way both are treated as a gold mine for gathering information on end users, often without their knowledge or consent. Bose is the latest company to stand accused of such shenanigans in a lawsuit filed yesterday in federal district court.
Efforts to improve mobile learning, boost broadband capacity, and tighten cybersecurity are the three top priorities in 2017 for educational technology leaders in K-12 school systems, according to a new survey by the Consortium for School Networking, which represents school district chief technology officers around the country.
The ShadowBrokers, an entity previously confirmed by The Intercept to have leaked authentic malware used by the NSA to attack computers around the world, today released another cache of what appears to be extremely potent (and previously unknown) software capable of breaking into systems running Windows. The software could give nearly anyone with sufficient technical knowledge the ability to wreak havoc on millions of Microsoft users.
Symantec said it had connected at least 40 attacks in 16 countries to the tools obtained by WikiLeaks, though it followed company policy by not formally blaming the CIA. The CIA has not confirmed the Wikileaks documents are genuine. But agency spokeswoman Heather Fritz Horniak said that any WikiLeaks disclosures aimed at damaging the intelligence community "not only jeopardize U.S. personnel and operations, but also equip our adversaries with tools and information to do us harm.
No matter how intelligent they claim to be, many smart home gadgets are vulnerable to hackers. Nowadays even the lock on your front door is susceptible to a cyberattack. No longer do you only have to worry about someone simply picking the lock, now a burglar could go through cyberspace to unlatch the door.
Ed Tech Strategies, a Virginia-based research and counsel consultancy, has published a K–12 Cyber Incident Map, an interactive visualization of cybersecurity-related incidents reported about United States K–12 public schools and districts from 2016 to the present.
U.S. President Donald Trump is extending by one year special powers introduced by former President Barack Obama that allow the government to issue sanctions against people and organizations engaged in significant cyberattacks and cybercrime against the U.S.
China is taking a page from the Pentagon's playbook under the Obama administration: it's partnering with tech companies to develop more cutting-edge weapons. But China's innovation-focused strategy could elevate the espionage risk to the U.S.
The White House’s first federal budget blueprint unveiled Thursday seeks to fund the nation’s cybersecurity efforts by boosting budgets of the U.S. Defense Department and Department of Homeland Security -- an initiative officials say will guard against the magnified threat landscape that is only getting worse.
The intelligence community uses undisclosed vulnerabilities to develop tools that can penetrate the computer systems and networks of its foreign targets. Unfortunately, since everyone uses the same technology in today’s global economy, each of these vulnerabilities also represents a threat to American businesses and individuals. In the future, rather than hoard this information, the CIA and other intelligence agencies should commit to responsibly disclosing vulnerabilities it discovers to the private sector so that security holes can be patched.