Topic

Cybersecurity

27 articles 2012–2018

(Don't) Hack the Vote!

Alice B. Lloyd · October 5, 2016

Even in this unconventional election, a highly conventional fact remains: A handful of swing states stand to decide who the next president will be. Meanwhile, early voting is already underway. And accusations that the system is "rigged" by cheaters seem to gain legitimacy as hacking attempts appear…

SAT Questions Leaked After Breach of Administering Company

Alice B. Lloyd · August 5, 2016

Hundreds of "test items" from the redesigned, Common Core-aligned SAT have leaked, according to a Reuters investigation into security breaches of the company that administers the test, College Board. The confidential "test items" are new reading comprehension packets and math problems, and now…

Hillary Supporter Calls Her 'The Devil We Know'

Jeryl Bier · August 4, 2016

Under the category "with friends like these," Jack Moss, founder of the Black Hat and DefCon hacking conferences, called Hillary Clinton "the devil we know" while headlining a Las Vegas fundraiser for the Democratic candidate for president Wednesday night. Moss's comments echoed remarks Donald…

Hillary Clinton Campaign Hosting 'Cybersecurity Fundraiser'

Jeryl Bier · August 1, 2016

The Hillary Clinton campaign is holding a fundraiser in Las Vegas this week during the annual Black Hat "global information security event." The announcements says that participants include Jeff Moss, the founder of Black Hat; Michael Sulmeyer, who, according to CSO Online is the Clinton campaign's…

Questions Leftover From The Apple-FBI Debate . . .

Alice B. Lloyd · July 13, 2016

An ominous “What now?" hung in the air after the FBI circumvented intransigent Apple to hack the San Bernardino shooter Syed Farook's iPhone back in March. The FBI paid a third-party firm that had come forward offering to unlock the phone but wouldn't disclose its methods to the feds. Thus…

A Market Is Born

Eli Lehrer · November 9, 2015

In 1988, Robert Tappan Morris, then a graduate student at Cornell University, decided to write a computer program to measure the size of the still-nascent Internet. Morris’s effort, a cleverly written bit of code that exploited security weaknesses, quickly spread through the computer network,…

National Archives Website Hacked; Selling Handbags, Shoes, Watches

Jeryl Bier · August 26, 2015

Advertisements in Japanese for handbags, backpacks, running shoes, and more began showing up on the website of the U.S. National Archives this week. Hackers managed to compromise a subdomain of the site, eisenhower.archives.gov. Below are screen captures of just two of the unauthorized pages:

Government Websites Vulnerable to Phishing Scams

Jeryl Bier · August 17, 2015

The websites of several federal government agencies, including the National Weather Service (NWS), are unprotected from scammers looking to exploit a security weakness to fool potential victims. The sites in question allow what are known as "unvalidated redirects." An unvalidated redirect is a link…

DHS Chief to Companies: Prepare Yourselves for Cyber Attacks

Michael Warren · December 19, 2014

Jeh Johnson, the secretary of homeland security, has released a statement following the North Korean-backed cyber attack on Sony Pictures. Johnson urges American companies to protect themselves against cybersecurity threats and says the Department of Homeland Security is "here to help."

What to Do About Cybersecurity?

Ken Jensen · March 8, 2013

Since the hacking of the New York Times, the Wall Street Journal, the Washington Post, etc., and the Mandiant revelations about China’s PLA Unit 61398, the media and Internet have exploded with talk of our reaching a “tipping point” in cybersecurity (or not, depending on the point of view). We’re,…