Advertisement

Showing 10 of 24 results

  • A U.S. Air Force F-16 aircraft flies near the Rionegro Airport during military drills between the Colombia and the United States in Rionegro, Antioquia department, Colombia, on July 12, 2021. (Photo by JOAQUIN SARMIENTO/AFP via Getty Images)
    Defense

    Air Force software platform expansion stalled by cybersecurity concerns

    DOD officials say cybersecurity concerns with the Air Force’s Platform One development environment are inhibiting code sharing with other DOD services.

  • Jen Easterly, nominee to be the Director of the Homeland Security Cybersecurity and Infrastructure Security Agency, testifies during her confirmation hearing before the Senate Homeland Security and Governmental Affairs Committee on June 10, 2021 in Washington, DC. Easterly will be responsible for overseeing the defense of national cyber attacks. (Photo by Kevin Dietsch/Getty Images)
    Tech

    CISA chief: Risk management agencies key to addressing sector-specific cyberthreats

    CISA will step up its close work with departments responsible for managing risks in key areas of U.S. infrastructure.

  • U.S. Marine Corps SSgt Michael George, USCENTCOM cybersecurity technician (Left), and U.S. Marine Corps SSgt. William Berotte, USCENTCOM cybersecurity technician (Right), demonstrate how simple it is to “hack” on older computer operating system at the USCENTCOM cybersecurity awareness expo, October 26, 2017. (Photo by Thomas Gagnier/ U.S. Central Command Public Affairs)
    Defense

    Hack the Marine Corps awards more than $151K in bug bounties

    Ethical hackers uncovered more than 150 vulnerabilities, netting more than $151,000 in awards during the two-week cyber challenge.

  • Uncategorized

    North Korean malware linked to Bangladesh bank hack

    Forensic specialists investigating the online robbery of the Bank of Bangladesh earlier this year say the hacking tools used in the attack were written by the same authors that developed the malware used to attack Sony Pictures Entertainment in 2014 — blamed by U.S. authorities on North Korea.

  • Tech

    The fixes needed to fight phishing

    No amount of training or information will stop computer-users clicking on malicious links or opening booby-trapped attachments in carefully crafted fake emails, research shows, so defeating phishing — a tactic that still provides the baseline method of network penetration even for the most advanced hackers — requires a technical solution.

Advertisement
Advertisement