The hacking threat to critical infrastructure in the United States and beyond is growing larger, with nation states and other malicious actors looking to gain a foothold in sensitive technologies to conduct espionage and potentially stage disruptive or destructive attacks.
The Department of Commerce and Department of Homeland Security Secretaries publicly released their report to the President, Supporting the Growth and Sustainment of the Nation's Cybersecurity Workforce.
As Americans increasingly fill their homes with smart technology, the risk of hackers exploiting their devices is growing. Experts say the expanding ecosystem of internet-connected devices such as smart thermostats, home security systems and electric door locks are increasingly susceptible to hackers, including those trying to leverage voice-command devices.
The ramifications were visible from day one, with major U.S.-media outlets including the LA Times and Chicago Tribune were forced to shutter their websites in parts of Europe." New European privacy regulations went into effect on Friday that will force companies to be more attentive to how they handle customer data. The ramifications were visible from day one, with major U.S.-media outlets including the LA Times and Chicago Tribune were forced to shutter their websites in parts of Europe.
WIRED has reached out to Netgear, TP-Link, Linksys, MicroTik, and QNAP for comment on the VPNFilter malware. Netgear responded in a statement that users should update their routers' firmware, change any passwords they've left as the default, and disable a "remote management" setting that hackers are known to abuse, steps it outlines in a security advisory about the VPNFilter malware. The other companies have yet to respond to WIRED's request.
A website flaw at a California company that gathers real-time data on cellular wireless devices could have allowed anyone to pinpoint the location of any AT&T, Verizon, Sprint or T-Mobile cellphone in the United States to within hundreds of yards, a security researcher said.
All 133 of U.S. Cyber Command’s Cyber Mission Force teams achieved Full Operational Capability (FOC), USCYBERCOM officials announced today. Achieving the FOC milestone early is a testament to the commitment of DoD’s four military services toward ensuring the nation’s cyber force is fully trained and equipped to defend the nation in cyberspace.
The internet is a dangerous place, replete with shady people looking to steal your personal information. Enabling two-factor authentication (sometimes called two-factor verification) is one of the best way to keep your online accounts secure. However, famed hacker Kevin Mitnick shows how even this security measure can’t completely protect your data if you don’t remain constantly vigilant.
...in recent years, a little more than half of thefts of consumers' personally identifying information were classified as "non-digital," meaning they didn't involve -- or at least, didn't start with -- the thief exploiting some cyber vulnerability, according to a 2017 report from the University of Texas at Austin's Center for Identity.
Within 24 hours of the announcement, researchers at security firm Crowdstrike reported a "notable" shift in Iranian cyberactivity, The New York Times reported. According to the Times, Iranian hackers sent emails containing malware to diplomats in the foreign affairs offices of U.S. allies and telecommunications companies.