cybersecurity

  • Will U.S. sanctions against Russia fix cybersecurity? Crunch Network

    Will U.S. sanctions against Russia fix cybersecurity?

    The United States has finally announced a comprehensive package of responses to Russia’s 2016 influence operation against the U.S. elections. This is a significant response, but a closer reading of the package reveals four important lessons about what this means for deterrence, statecraft and cybersecurity. Read More

  • ForeScout-Splunk integration hopes to bring greater insight to IoT security

    ForeScout-Splunk integration hopes to bring greater insight to IoT security

    ForeScout announced an integration with Splunk today that it hopes will bring a new level of security visibility to Internet of Things devices. The new tool dubbed The ForeScout Extended Module for Splunk, allows two-way communication between the ForeScout CounterACT tool and Splunk Enterprise or Splunk Enterprise Security (Splunk ES) — with the goal of finding issues faster in order… Read More

  • Yahoo shares tumble as investors fear Verizon acquisition trouble

    Yahoo shares tumble as investors fear Verizon acquisition trouble

    Yahoo shares tumbled 6% on Thursday as investors feared that the latest Yahoo hack could spell bad news for its sale to Verizon. This is the second major hack revelation in recent months and there’s speculation that Verizon could be spooked. Some are wondering if Verizon will ask for a discount on the $4.8 billion deal or scrap it altogether. TechCrunch is owned by Verizon, but we do… Read More

  • Is the U.S. no longer tamper-proof? Crunch Network

    Is the U.S. no longer tamper-proof?

    In a year that has proven to have a mind of its own, America received another rattling of the cages just this past weekend, and the implications could not be more distressing. The United States of America’s presidential election and its congressional races were likely tampered with by another country. To what extent those efforts affected the outcome of the election we don’t know… Read More

  • A single typo may have tipped the election

    A single typo may have tipped the election

    Among the many exasperating lapses detailed in the New York Times’ lengthy report on Russia’s apparent interference with the 2016 election, one in particular stands out — the scale of its repercussions matched only by its banality. It seems that the hack of John Podesta’s emails may have been the result of a single typo in an email intended to warn him of the risk. Read More

  • Protecting America’s critical infrastructure must remain a priority Crunch Network

    Protecting America’s critical infrastructure must remain a priority

    America’s dependence on technology and web-based communication has forever changed the way government functions at every level. But it’s not only highly sensitive data and intellectual property that government officials must keep secure; America’s access to drinking water, electricity, transportation networks and countless other types of critical infrastructure are at risk… Read More

  • Buying stolen data Crunch Network

    Buying stolen data

    Should companies buy stolen data from third parties to combat credential reuse attacks against themselves? Herein we discuss the rampant, and quiet, practice of legitimate companies buying stolen data off the dark web. Read More

  • How blockchain can help fight cyberattacks Crunch Network

    How blockchain can help fight cyberattacks

    Imagine a computing platform that would have no single point of failure and would be resilient to the cyberattacks that are making the headlines these days. This is the promise behind blockchain, the distributed ledger that underlies cryptocurrencies like Bitcoin and Ethereum and challenges the traditional server/client paradigm. Read More

  • Crunch Report | China’s New Cybersecurity Laws

    China has some new cybersecurity laws, starting in January 2017, Tesla will charge owners of new Teslas for Supercharger use if they drive more than 1,000 miles a year, Samsung leaks its AI plans for the Galaxy S8, Gmail for iOS gets an update and, on Election Day, Google will be refreshing election results every 20 seconds. All this on Crunch Report. Read More

  • Why the Department of Transportation’s self-driving car guidelines aren’t enough Crunch Network

    Why the Department of Transportation’s self-driving car guidelines aren’t enough

    Ford, GM, Toyota and VW are just a handful of the car manufacturers planning to put self-driving cars on the road in the next five years. If you ask Uber or Tesla, they might say driverless cars have already arrived… which means we’re running out of time to secure one of the juiciest new targets for hackers. Read More

  • UK commits £1.9B to National Cyber Security Strategy, working with Microsoft and more

    UK commits £1.9B to National Cyber Security Strategy, working with Microsoft and more

    The recent rush of allegations against countries like Russia and China and their possible roles in cyber attacks on countries like the U.S. have prompted a big move from the UK: the government said today that it plans to invest £1.9 billion ($2.3 billion) over the next five years in a new cyber defence plan, called the National Cyber Security Strategy, to prepare for and fight back… Read More

  • HYPR raises $3 million to keep hackers from getting their hands on your fingerprints

    HYPR raises $3 million to keep hackers from getting their hands on your fingerprints

    If your account gets hacked these days, the first thing you’ll do typically is reset your password, maybe beef up your security settings, and proceed to use the account or app again. But what if hackers get their hands on your fingerprint, iris or other biometric data? You can’t just change your fingerprints or eyes on a whim. That’s where a New York City startup called… Read More

  • NHTSA releases best practice guidelines for vehicle cybersecurity

    NHTSA releases best practice guidelines for vehicle cybersecurity

    Following its release of guidelines for automakers regarding self-driving cars, the National Highway Traffic Safety Administration has released a similar set of guidelines or “best practices” for cybersecurity in vehicles, designed to provide guidance for car makers. The best practices document is 22 pages and is non-binding, meaning there’s no regulatory imperative… Read More

  • Clinton Foundation denies hack claims by Guccifer 2.0

    Clinton Foundation denies hack claims by Guccifer 2.0

    The hacker who claimed responsibility for the Democratic National Committee email leak claims to have breached the Clinton Foundation’s servers and retrieved a number of files potentially damaging to the Democratic Presidential nominee — but the Foundation denies any such breach occurred. The hacker, Guccifer 2.0, posted screenshots and spreadsheets they claimed were from the… Read More

  • So now we have a federal CISO Crunch Network

    So now we have a federal CISO

    So now we have a federal CISO as part of the OMB (Office of Management and Budget). But what does that really mean? Read More

  • Karamba Security raises $2.5 million to keep self-driving cars safe from hackers

    Karamba Security raises $2.5 million to keep self-driving cars safe from hackers

    A cybersecurity startup based in Hod Hasharon, Israel, Karamba Security, has raised $2.5 million in new Series A funding to protect internet-connected cars and self-driving vehicles from hackers. Fontinalis Partners, a venture firm that is focused on mobility and transportation-related technologies, led the investment joined by Karamba’s earlier seed backers YL Ventures and… Read More

  • Cybersecurity is threatening America’s military supremacy Crunch Network

    Cybersecurity is threatening America’s military supremacy

    The sparsely populated Spratly Islands are quickly becoming the center of one of the most contentious international disputes between world powers since the fall of the Soviet Union. Alarmingly, the use of cyber attacks suggests we might already be in the midst of a new Cold War playing out in cyberspace — where America’s advantage is not as clear as it is with conventional armies… Read More

  • Hacking for investor profit Crunch Network

    Hacking for investor profit

    Just over four years ago, I sat through what still is the most viscerally disturbing information security talk I’ve ever seen. The late Barnaby Jack, a brilliant security researcher, had just demonstrated in front of 300 people how he could wirelessly take control of an Implantable Cardioverter Defibrillator and cause it to discharge enough electricity to jump a 12 mm spark gap. Read More

  • Just how vulnerable is election technology? Crunch Network

    Just how vulnerable is election technology?

    This year’s electoral process has been unconventional, to say the least. As this volatile election approaches, citizens are skeptical about whether our electoral system — particularly the technology used in it — is precise, unbiased or secure enough to produce a fair, accurate vote count. But just how vulnerable is our election technology? Read More

  1. 1
  2. 2
  3. ...