WASHINGTON — The Obama administration on Thursday revealed that 21.5 million people were swept up in a colossal breach of government computer systems that was far more damaging than initially thought, resulting in the theft of a vast trove of personal information, including Social Security numbers…
Read More...
Browsing Tag
cyberterror
A group of the world's top cybersecurity experts recommend against giving government agencies like the FBI and the National Security Agency backdoor access to the encrypted information stored by tech giants like Google and Facebook, saying it would put sensitive data at risk of being compromised by…
Read More...
Updated | Hacking Team, a cybersecurity company that sells hacking software to law enforcement in dozens of countries, just got hacked itself. The Italian outfit’s security services use malware and vulnerabilities to tap into target computers and phones.... Read more
Read More...
In yesterday’s world of enterprise security, there were a few well-known points of weakness for the bad guys to target in their attacks, which made defending against threats, well, much simpler. But today’s mobile and cloud-enabled world offers thousands, if not millions, of touch points for…
Read More...
Take it from someone who has spent 41 years of his career as a mathematician, cryptographer and technical director at the U.S. National Security Agency: Healthcare is hugely vulnerable to cybercrime. And this is a reality health organizations need to quickly come to terms with so they can better…
Read More...
The National Security Agency shut off its massive collection of U.S. telephone records at 11:59 p.m. EDT Sunday, shortly after a rare weekend session in the Senate failed to craft a measure to extend the program. Senators moved forward with a House-passed bill that would reform the NSA's…
Read More...
It’s a brave new world when hackers step in to protect citizens because regulators are not getting the job done.
Two years after President Obama signed an executive order setting voluntary guidelines that companies could follow to prevent cyberattacks — especially on critical infrastructure like…
Read More...