cyber attack
Hackers Target Chip Makers
Another indication of the strategic importance of the foundational semiconductor industry is a recent surge in cyberattacks directed at global chip manufacturers. Security researchers in Taiwan reported earlier this ...Full Article
Russian Malware Targets Linux, US Warns
The Russians are coming, again, this time with new malware targeting Linux systems, according to a U.S. advisory issued this week. The FBI and the U.S. National Security Agency ...Full Article
DARPA Stress Tests its Hardware-Centric Security Approach
The Defense Advanced Research Projects Agency launched a cyber security effort several years back designed to replace commonly used security patches for software applications with the ability to spot ...Full Article
COVID-19 Contact Tracing Apps Attracting Hackers
As contact tracing ramps up for exposure to COVID-19, so too are concerns about data privacy and whether phony tracing apps will expand opportunities for attackers preying on citizens ...Full Article
Shift to AI Tools Doesn’t Guarantee Secure IT
AI and machine learning tools enlisted to bolster the security of enterprise infrastructure are ubiquitous. Still, a vendor survey reveals a persistent gap between deployment and working knowledge about ...Full Article
Fending off AI Armageddon: Threats to Our Data, Our Safety, Our Country
Bruce Schneier is scary smart. The things he talks about – AI weaponization, remote hacking of commercial airliners and self-driving cars, malicious alteration of medical records – are scarier. ...Full Article
Researcher: Few Financial Incentives to Invest on Cybersecurity
You may have noticed that big retailers like Target, the target of a massive security breach, have finally gotten around to installing new "point of sales" terminals. Moreover, your ...Full Article
The Day the Networks Died: Attack or Glitch for NYSE, United?
The New York Stock Exchange (NYSE) resumed trading at 3:13 pm EST today, after an "internal technical issue" suspended operations for almost four hours. Only three days after HackingTeam ...Full Article
How to Avoid Being a Hacker Victim
Following in the wake of the recently publicized attacks on government databases and systems, all CIOs and chief security officers should assume their own organizations could be next and ...Full Article
Can CIP Compliance Stymie a Cyber Attack?
<img src="http://media2.hpcwire.com/dmr/uspowergrid.gif" alt="" width="95" height="57" />In the wake of the destruction caused by Hurricane Sandy, it's not difficult to imagine the damage that's possible when the power grid is ...Full Article