We should take from this recent attack a renewed determination for more urgent collective action. We need the tech sector, customers, and governments to work together to protect against cybersecurity attacks. More action is needed, and it’s needed now. In this sense, the WannaCrypt attack is a wake-up call for all of us. We recognize our responsibility to h
CS Digest Section: Private Sector
The event expands on the DoD 'Hack the Pentagon' bug bounty program by broadening the participation pool from U.S. citizens to include "white hat" hackers from the United Kingdom, Canada, Australia and New Zealand.
"The sharing of individual indicators of compromise without context leaves practitioners asking more questions than having them answered," Intel Security Group vice president Scott Montgomery said at a March 9 hearing of the Cybersecurity and Infrastructure Protection Subcommittee of the House Homeland Security Committee.
Boston, Mass.-based Rapid7 can, effective immediately, assign CVE identifiers to vulnerabilities found in its own products and software from other vendors, regardless if the issues have been disclosed by Rapid7 employees or third-party experts.
Microsoft, Intel, and IBM are three of the most vocal companies that opposed China’s plans to access proprietary source code of software and technology products in order to make sure that they’re hackerproof or do not include backdoors.
The latest wearable tech to get people talking isn’t an activity tracker or a watch. It’s a glove that gives the wearer an entirely new set of fingerprints, fooling even the best fingerprint scanners on the market.
Secure financial messaging service Swift has warned member banks of a fresh wave of attempted and successful cyber heists.
Cyber attacks aren’t just an IT problem.
Cybersecurity Ventures recently reported worldwide spending on cyber defense products and services is forecast to exceed $1 trillion for the five-year period from 2017 to 2021 -- driven by the dramatic rise in cybercrime, the ransomware epidemic, and the refocusing of malware from PCs and laptops to smartphones and mobile devices.