Зарубежные новости fifthdomain.com
Department of Homeland Security warns of cyberattacks on third-party companies by China
Chinese hackers have done the math and have figured out that infiltrating the third-party companies that store confidential details about big businesses is more efficient than attacking each of those firms individually, Department of Homeland Security and information security analysts said. ...
Why Augusta deserves to be home to a cyber army
More than five years ago, I boarded a shuttle bus from the Pentagon to Capitol Hill for the first of many briefings to congressional staffers on the Army's plan to consolidate its cyber institutions at Fort Gordon in Augusta, Georgia. Most staffers were polite, professional, ...
The Pentagon's red team hackers need more time, personnel and money
The Pentagon's chief weapons tester said that the red teams the military uses to find cyber vulnerabilities and to mimic enemy actions 'urgently' need more resources, including additional personnel, training and advanced capabilities. The director of operational test and evaluation, ...
Intelligence officials and academics say the United States needs to expand its cyber surveillance authorities and capabilities to meet the Trump administration's vision to be more aggressive in cyberspace.
The United States needs to expand its cyber intelligence authorities and capabilities to meet the Trump administration's new cybersecurity strategy, according to top current and former government officials and academics. ...
Report finds no significant interference in midterm elections
A new report from two top Trump administration officials said they have found no evidence that foreign governments had a significant impact on the integrity of the 2018 midterm elections. Acting Attorney General Matthew Whitaker and Homeland Security chief Kirstjen M. Nielsen said in a Feb. ...
A new, even more secure method is gaining popularity, and it's a lot like an old-fashioned metal key. It's a computer chip in a small portable physical form that makes it easy to carry around.
(THE CONVERSATION) With all the news about accounts being hacked and other breaches of digital security, it's easy to wonder if there's any real way to keep unauthorized users out of our email and social media accounts. ...
Is cybersecurity more important than cost, schedule or performance?
The U.S. Department of Defense plans to spend $1.2 trillion to develop major weapons, according to reports from the Congressional Budget Office. The Pentagon will spend more in future years. And because of that, ...
A Connecticut city says it has recovered more than half the nearly $1 million stolen from city accounts during a 2016 hacking scheme.
NORWALK, Conn. (AP) РІР‚' A Connecticut city says it has recovered more than half the nearly $1 million stolen from city accounts during a 2016 hacking scheme. An attorney for the city of Norwalk said Wednesday that by filing claims, complaints and a lawsuit against insurance companies, ...
Can the government make cyber cool for college grads?
One by one, six intelligence officers made a pitch for tech-savvy college graduates to join their ranks. 'There is nothing more rewarding than protecting the American people,' FBI Director Chris Wray said when asked by Senator Richard Burr, R-N.C., ...
New research shows how the shutdown did and didn't impact the government's digital defenses.
Lawmakers and IT security analysts have warned that the 35-day partial government shutdown crippled cybersecurity of federal networks. However, new research shows that the shutdown actually boosted the federal government's digital defenses in some areas. Security Scorecard, ...
The command wants to support its J9 advanced concepts and technology directorate.
U.S. Cyber Command is looking to beef up its main acquisition and capabilities development arm with contractor support. In a Jan. 25 request for information released on the FedBizOpps website, Cyber Command's J9, or advanced concepts and technology directorate, ...
A main priority for the Department of Defense's cyber enterprise this year will be implementing elements of its cyber strategy, according to the DoD's top uniformed cyber policy adviser.
Following a year of cyberspace strategizing, 2019 will be all about implementing rules and tools, according to the Department of Defense's top uniformed cyber policy adviser. Appearing Jan. 29 before the Senate Armed Services Subcommittee on Cybersecurity, Brig. Gen. ...
For evidence of new cyber strategy, look to midterms
U.S. efforts to head off cyber events and impose consequences on adversaries has worked, at least in the short-term, the head of U.S. Cyber Command told Congress Jan. 29. However, it is unclear if that success will change the way enemies act in the long run. Gen. Paul Nakasone, commander of U.S. ...
Apple has made the group chat function in FaceTime unavailable after users said there was a bug that could allow callers to activate another user's microphone remotely.
Apple has made the group chat function in FaceTime unavailable after users said there was a bug that could allow callers to activate another user's microphone remotely. The bug was demonstrated through videos online and reported on this week by tech blogs. ...
The researchers who reported that Israeli software was used to spy on Washington Post journalist Jamal Khashoggi's inner circle before his gruesome death are being targeted in turn by international undercover operatives.
NEW YORK РІР‚' The researchers who reported that Israeli software was used to spy on Washington Post journalist Jamal Khashoggi's inner circle before his gruesome death are being targeted in turn by international undercover operatives, the Associated Press has found. Twice in the past two months, ...
The U.S. intelligence community took aim at China during its annual assessment of worldwide threats, accusing the East Asian giant of blistering cyberattacks that are the foundation of a prolonged espionage campaign.
The U.S. intelligence community took aim at China during its annual assessment of worldwide threats, accusing the East Asian giant of blistering cyberattacks that are the foundation of a prolonged espionage campaign. ...
Why note cards can't simulate a cyberattack
When American soldiers train for a cyberattack on the battlefield, they often use note cards. Although the U.S. military prides itself on being the best trained fighting force in the world, ...