Managing the Mobile Phone Malware Threat
What do you use your phone for in a given day? Texting, checking the news, social media, banking, getting directions, playing games – most people […] More
What do you use your phone for in a given day? Texting, checking the news, social media, banking, getting directions, playing games – most people […] More
Bring-your-own-device culture is very convenient, but with a growing amount of malware targeting mobile devices, it is also creating new vulnerabilities. The Cipher Brief spoke […] More
Everyone knows that they need to protect their computers from hackers, but have you ever considered what would happen if someone hacked your car? Automakers […] More
It is hard to miss the frightening headlines about car hacking scenarios. But in reality, there’s more to automotive cyber security. Hackers may be individuals […] More
Cars, like many other everyday objects, are now more connected to wireless networks than ever before – and this has caused a corresponding rise in […] More
Over the last week, startup CEOs and defense industry experts have been ramping up efforts to push for a more agile, fast-paced way of dealing […] More
As the United States seeks to retain its qualitative military edge over our peers, our military leaders have expressed an increased desire to rapidly acquire […] More
When it comes to Silicon Valley buzzwords, “the cloud” is one of the most ubiquitous and one of the most misunderstood. The cloud is essentially […] More
Access to cloud-based infrastructure has revolutionized how businesses store and work with their data, but the convenience of cloud-based systems is not without risk. The […] More
Way back in the 18th century, Ben Franklin said, “Distrust and caution are the parents of security.” That insight is entirely appropriate in the 21st […] More
On Friday, Dyn, a company that routes and manages internet traffic, suffered multiple Distributed Denial of Service (DDoS) attacks throughout the day. Major sites such […] More
Some stunning things have happened in the past year. Cars were remotely hacked and run off the road. Thieves digitally stole cars in volume, at […] More
The Internet-of-Things has for years promised to usher in a new wave of innovation. It has sometimes been called the Internet-of-Everything or Internet 3.0—grand language […] More
When hackers recently breached the computer systems of the Bangladesh Central Bank and tried to steal nearly $1 billion from its account at the Federal […] More
The Sony Pictures Entertainment hack served as a very public wake-up call to the dangers posed by malicious hackers. In the course of the attacks, […] More
Dark Hotel, Crouching Yeti, Machete, Sofacy, Sandworm – what do these words have in common? They are all names given to hacker groups that have […] More
There’s still much to be learned about the unauthorized release of the so-called Panama Papers, the documents exposing the financial interests of prominent world figures […] More
In the nineteenth century, American strategist Alfred Thayer Mahan helped define a new understanding of maritime security and the role of the U.S. Navy in […] More
Search