Wednesday, April 24, 2019

Tag: Cybersecurity

Germany Can Protect the Liberal Order

As U.S. President Barack Obama arrived in Berlin for a farewell visit on Wednesday, German policymakers were scrambling to develop a road map for dealing with the presidency of his successor, Donald Trump. Last week, in a congratulatory note to the president-elect, German Chancellor Angela Merkel gently conditioned Germany's...

The Internet of Things Is a Cyberwar Nightmare

But we can still prevent our household appliances from becoming an army of malicious computer zombies out to destroy the web. The world got a glimpse of the future last month when a large-scale cyberattack prevented access to hundreds of key websites, including Twitter, the online New York Times, and...

Donald Trump, After Blasting Iraq War, Picks Top Iraq Hawk as Security Adviser

Donald Trump named former CIA director and extremist neoconservative James Woolsey his senior adviser on national security issues on Monday. Woolsey, who left the CIA in 1995, went on to become one of Washington’s most outspoken promoters of U.S. war in Iraq and the Middle East. As such, Woolsey’s selection...

Did Russia Really Hack U.S. Election Systems?

American e-voting is vulnerable to hacking, but that doesn’t mean Moscow’s agents hacked Illinois and Arizona voter databases — this time. When an FBI alert to state election authorities warning them of hacking leaked to the media this week, the result was one of studied panic. Two voter registration databases...

This malware sold to governments could help them spy on iPhones, researchers say

Many people assume their iPhones are secure, but new research sent Apple scrambling to fix vulnerabilities that left users at risk. Spyware relying on three previously unknown, or “zero-day,” flaws in Apple’s iOS mobile operating system for years made it possible for governments to take over victims' phones by tricking them into...

The NSA Leak Is Real, Snowden Documents Confirm

On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly...

Mysterious Group Hacks The NSA

The latest hack revealed over the weekend has nothing to do with the Democratic Party or George Soros, and instead a mysterious hacker group by the name “The Shadow Brokers” claims to have hacked the Equation Group - a government cyberattack hacking group associated with the NSA, and released...

Powerful NSA hacking tools have been revealed online

Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days, a development that could pose severe consequences for the spy agency’s operations and the security of government and corporate computers. A cache of hacking tools with code...

NSA Hacked? Shadow Brokers Crew Claims Compromise Of Surveillance Op

Has the NSA just been hacked? Security experts speaking with FORBES think it’s possible, after a group published malware and attack code allegedly belonging to the Equation Group, a crew linked to the US intelligence agency. But while many believe the leak looks legitimate, the hackers could have pulled...

NYT Reveals Think Tank It’s Cited for Years to Be Corrupt Arms Booster

A recent New York Times article (8/7/16) detailed, in often scathing terms, what many media critics already knew: that think tanks are frequently not objective, neutral arbiters of information, but corporate- and government-funded agenda-promoters with an academic veneer to give the appearance of impartiality. One of the two think tanks...

Can This Israeli Startup Hack Your Phone?

Many computer-security companies trumpet their skills and accomplishments. Some take another tack altogether, like NSO Group. This Israeli startup no longer operates a website. But it has peddled its wares to the Mexican government, gotten on the radar of Central Intelligence Agency officials and recently was bought by an American private equity firm. A...

If Russian Intelligence Did Hack the DNC, the NSA Would Know, Snowden Says

As my colleague Glenn Greenwald told WNYC on Monday, while there may never be conclusive evidence that the Democratic National Committee was hacked by Russian intelligence operatives to extract the trove of embarrassing emails published by WikiLeaks, it would hardly be shocking if that was what happened. “Governments do spy...

A Transatlantic Plan to Bolster Europe’s Cyber Defenses

The cyber world of the 21st century may soon look dangerously similar to the political world of the 19th. It’s cliché to say that we are increasingly dependent on internet-enabled technologies. Nevertheless, Europe is struggling to keep up. Shrinking budgets limit European countries’ ability to invest in building resilience against...

Are We Entering a New Cold War?

It’s not a strong Russia we should fear, but a weak one. Every year, the security glitterati of the world gather in Germany for the annual Munich Security Conference. The forum has been around for decades, but this year, over an unseasonably warm weekend, the most dramatic speech was about...

The admiral in charge of Navy intelligence has not been allowed to see military...

For more than two years, the Navy’s intelligence chief has been stuck with a major handicap: He’s not allowed to know any secrets. Vice Adm. Ted “Twig” Branch has been barred from reading, seeing or hearing classified information since November 2013, when the Navy learned from the Justice Department that...

Congress Slips CISA Into a Budget Bill That’s Sure to Pass

Privacy advocates were aghast in October when the Senate passed the Cybersecurity Information Sharing Act by a vote of 74 to 21, leaving intact portions of the law they say make it more amenable to surveillance than actual security. Now, as CISA gets closer to the President’s desk, those...

Secretive cyber warfare firm NSO Group explores sale

NSO Group Ltd, a company that helps governments spy on mobile phones and is so secretive that it regularly changes its name, is exploring a sale that could value it at close to $1 billion, including debt, according to people familiar with the matter. The move comes as governments around...

Pentagon steps up private-sector cyber exchanges

The Defense Department is stepping up an exchange program to bring private-sector IT experts into the Pentagon and send military personnel into the corporate world, said Defense Department CIO Terry Halvorsen. A program that has brought Cisco to the Pentagon to share its expertise on routers will expand to include...

Estonia Tackles Improving NATO’s Cyber Defenses

PENTAGON - These days, it seems like nowhere in the cyber realm is safe. Hacks have infiltrated all walks of cyber life, from the email system used by the Joint Chiefs of Staff’s office at the Pentagon, to the cheating spouses on the Canada-based Ashley Madison website. But the NATO Cooperative...

Hacking Team hacked: firm sold spying tools to repressive regimes, documents claim

Cybersecurity firm has 400GB of what purport to be its own documents published via its Twitter feed after hack. The cybersecurity firm Hacking Team appears to have itself been the victim of a hack, with documents that purport to show it sold software to repressive regimes being posted to the...

Israel-Linked Spy Virus Discovered At Hotels Used For Iran Nuclear Talks

Earlier this spring, the cybersecurity firm Kaspersky was testing an advanced antivirus software on one of its computers when it stumbled on something big: As the Moscow-based company puts it, it was "one of the most skilled, mysterious and powerful" spy viruses in the world. The piece of software was...

DoD, IT Industry Program Achieves Mutual Benefits

WASHINGTON, June 08, 2015 — A collaborative learning venture between the Defense Department and private-sector information technology companies features the exchange of IT personnel and the corresponding benefits of their knowledge, experience and skills for up to a year. The Information Technology Exchange Program, or ITEP, gives the department and...

Pentagon Announces New Strategy for Cyberwarfare

SAN FRANCISCO — The Pentagon on Thursday took a major step designed to instill a measure of fear in potential cyberadversaries, releasing a new strategy that for the first time explicitly discusses the circumstances under which cyberweapons could be used against an attacker, and naming the countries it says...

DOD recruits Silicon Valley for cyber, innovation efforts

Carter unveiled his cyber strategy but displayed his doctoral thesis during his speech at Stanford. In formally unveiling the Defense Department’s new cyber strategy during a visit to the Silicon Valley Thursday, Defense Secretary Ash Carter underscored the changes in the technology and cybersecurity landscapes in recent years and said...

Cyber chief: Efforts to deter attacks against the U.S. are not working

The government’s efforts to deter computer attacks against the United States are not working and it is time to consider boosting the military’s cyber-offensive capability, the head of U.S. Cyber Command told Congress on Thursday. “We’re at a tipping point,” said Adm. Michael S. Rogers, who also directs the National...

Building backdoors into encryption isn’t only bad for China, Mr President

The White House wants tech companies to hand over encryption keys or build backdoors. So why is it criticizing China for wanting the same thing? Want to know why forcing tech companies to build backdoors into encryption is a terrible idea? Look no further than President Obama’s stark criticism of...

Obama sharply criticizes China’s plans for new technology rules

(Reuters) - President Barack Obama on Monday sharply criticized China's plans for new rules on U.S. tech companies, urging Beijing to change the policy if it wants to do business with the United States and saying he had raised it with President Xi Jinping. In an interview with Reuters, Obama...

Revising U.S. Grand Strategy Toward China

"China represents and will remain the most significant competitor to the United States for decades to come. As such, the need for a more coherent U.S. response to increasing Chinese power is long overdue," write CFR Senior Fellow Robert D. Blackwill and Carnegie Endowment for International Peace Senior Associate...

What NSA Director Mike Rogers Doesn’t Get About Encryption

At a New America Foundation conference on cybersecurity Monday, NSA Director Mike Rogers gave an interview that—despite his best efforts to deal exclusively in uninformative platitudes—did produce a few lively moments. The most interesting of these came when techies in the audience—security guru Bruce Schneier and Yahoo’s chief information...

How the CIA made Google

Inside the secret network behind mass surveillance, endless war, and Skynet. The origins of this ingenious strategy trace back to a secret Pentagon-sponsored group, that for the last two decades has functioned as a bridge between the US government and elites across the business, industry, finance, corporate, and media sectors....

Article Filter Options