FBI director renews push for back doors, urging vendors to change business...
The FBI still wants backdoors into encrypted communications, it just doesn't want to call them backdoors and it doesn't want to dictate what they should look like.FBI Director James Comey told the...
View ArticleActs of terrorism could push Congress toward encryption backdoors in 2016
Despite the risks to online commerce, international high-tech sales, security of trade secrets and the fact that it won't actually make encryption useless to criminals, decryption backdoors to let law...
View Article10 amazing algorithms for the real world
Figuring out mysteriesImage by FlickrCyber technology couldn’t get by without algorithms to encrypt, analyze metadata, and find traffic anomalies, but they are used more and more widely in other...
View ArticleMicrosoft, Google, Facebook to U.K.: Don't weaken encryption
Microsoft, Google and Facebook are urging U.K. officials not to undermine encryption as they work on laws that would authorize forcing communications service providers to decrypt customer traffic.In a...
View ArticleStartup's security platform uses AI to to learn from human decision making
Startup PatternEx with roots in MIT’s artificial intelligence lab is launching a security platform it says employs artificial intelligence by learning from input it gets from human security analysts...
View Article8 hot technologies the CIA wants
Of interest to the CIAThe CIA has been investing in startups since 1999 through its not-for-profit arm called In-Q-Tel, hoping to accelerate development of technologies the agency might find useful. It...
View ArticleReport: Hacker steals, posts personal details on 9,000 DHS employees
A hacker posted the names, phone numbers, and other details about 9,000 Department of Homeland Security employees and says he will post 20,000 similar records about FBI workers. He claims to have...
View ArticleBill in Congress would ban states from seeking encryption backdoors
Four Congressmen are proposing that states be forbidden to ask manufacturers to install encryption backdoors on their products outfitted with the technology. U.S. Rep. Ted Lieu The four filed a short...
View ArticleStartup touts four-factor authentication for VIP-level access
Startup Trusona is launching what it claims to be a 100 percent accurate authentication scheme aimed at corporate executives, premiere banking customers and IT admins who have unfettered authorization...
View ArticleFBI is helping to crack an iPhone in an Arkansas murder case
Now that it has found a way to do so for its own purposes in a California terrorism case, the FBI is helping Arkansas prosecutors break into an iPhone and iPad.This time it's to look for evidence in a...
View ArticleSenators release official draft of federal encryption legislation
The first proposed federal encryption legislation has been released, and had it been established law earlier this year Apple would have had to provide the help the FBI asked for in accessing encrypted...
View ArticleU.S. cyberwar against ISIS could use methods and tactics criminals use...
Cyberwar against ISIS could bring into play tools and tactics that corporate security pros face every day, only this time they will be used as part of a larger objective than criminal profit.The goals...
View ArticleTrend Micro: 6 most popular homebrewed terrorist tools
Terrorists are developing and distributing encryption tools that protect privacy of their communications, as well as other homegrown apps that include a news-feed compiler and DDoS attack software,...
View ArticleBlack Hat: 9 free security tools for defense and attacking
When Black Hat convenes next week in Las Vegas, it will be a rich environment for gathering tools that can be used to tighten security but also -- in the wrong hands -- to carry out...
View ArticleLargest DDoS attack ever delivered by botnet of hijacked IoT devices
Securing the internet of things should become a major priority now that an army of compromised devices – perhaps 1 million strong - has swamped one of the industry’s top distributed denial-of-service...
View ArticleSecurity blogger Krebs says IoT DDoS attack was payback for a blog
Security blogger Brian Krebs says a massive distributed denial-of-service attack that took down his website last week was likely the consequences for his outing of two Israelis who ran a DDoS-for-hire...
View ArticleAkamai warns: Look for IoT devices to attack during Thanksgiving, Christmas
The annual holiday uptick in denial of service attacks will likely continue this year only this time with a new devastating weapon: Internet of Things (IoT) devices, according to Akamai.In its...
View ArticleIBM sets up test range to practice fighting cybersecurity battles
IBM Security has launched a network-emulation environment where corporate teams can play out attack scenarios so they are better prepared for incidents they might face in the real world.The facility,...
View ArticleCisco scrambling to fix a remote code execution problem in WebEx
Cisco’s Webex Browser Extension contain a critical bug that can open up customers’ entire computers to remote code execution attacks if the browsers visit websites containing specially crafted...
View ArticleThat Hearbleed problem may be more pervasive than you think
That lingering Hearbleed flaw recently discovered in 200,000 devices is more insidious than that number indicates.According to a report posted by Shodan, the Heartbleed vulnerability first exposed in...
View Article