Security News
SEE: TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download. "A lack of a standard for IoT devices brings forth many challenges from a management perspective, in particular security, as we are increasing the attack vector for each new IoT device introduced," said Shash Anand, VP of product strategy at SOTI, an IoT connectivity and management provider. Given the variety of IoT devices and systems around, it will be imperative that IoT standards are universally accepted and integrated across devices.
Secretary of State Mike Pompeo on Wednesday accused U.S. universities of caving to Chinese pressure to blunt or bar criticism of the Chinese Communist Party. Pompeo took aim at universities across the U.S., claiming they refused to address the Trump administration's concerns about China's attempts to influence students and academics.
Group-IB announces that its Threat Intelligence & Attribution system has been found compliant with the recommendations issued by United States Department of Justice for cybersecurity and cyber intelligence companies. The independent assessment of Group-IB Threat Intelligence & Attribution technologies was carried out by one of the Big Four accounting companies and has proved Group-IB's conformity with industry recommendations for gathering cyber threat intelligence data.
The United States and Australia have signed a first-ever bilateral agreement that allows the U.S. Cyber Command and the Information Warfare Division of the Australian Defense Force to jointly develop and share a virtual cyber training platform. The two countries' departments of defense will achieve this by incorporating IWD's feedback into USCYBERCOM's simulated training domain known as the Persistent Cyber Training Environment.
China poses the greatest threat to America and the rest of the free world since World War II, outgoing National Intelligence Director John Ratcliffe said Thursday as the Trump administration ramps up anti-Chinese rhetoric to pressure President-elect Joe Biden to be tough on Beijing. "It offered nothing new but repeated the lies and rumors aimed at smearing China and playing up the China threat by any means," Hua said at a daily briefing on Friday.
In the modern twist on old-fashioned war games, the U.S. military dispatched cyber fighters to Estonia this fall to help the small Baltic nation search out and block potential cyber threats from Russia. The U.S. Cyber Command operation occurred in Estonia from late September to early November, officials from both countries disclosed this week, just as the U.S. was working to safeguard its election systems from foreign interference and to keep coronavirus research from the prying reach of hackers in countries including Russia and China.
The American Civil Liberties Union has sued the US government, claiming Homeland Security agents trampled over people's constitutional rights - by buying phone location data from commercial brokers rather than getting necessary search warrants. "These practices raise serious concerns that federal immigration authorities are evading Fourth Amendment protections for cell phone location information by paying for access instead of obtaining a warrant," the ACLU said in a statement this week.
US securities industry regulator FINRA warned brokerage firms earlier this week of ongoing phishing attacks using a recently registered web domain spoofing a legitimate FINRA website. WHOIS domain data does not provide any information on who registered the phishing domain since all personal information is redacted using the registrar's privacy service.
They also provided a set of extensive mitigation measures to be immediately implemented by think tank organizations' leaders, staff, and IT staff to strengthen their security posture and defend against ongoing attacks by nation-state hacking groups. The FBI also issued a 'TLP:WHITE' private industry notification in April 2020 regarding the continued targeting of US think tanks by state-backed APT groups since at least 2014, with the end goal of gaining access to and exfiltrating sensitive information.
For many of us stuck working from home for most of the year, the lines between work and home activities have blurred. Similar to how social distancing can help prevent the spread of COVID-19, keeping a 'six foot distance' between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.