Rod Boshart The Gazette More stories from Rod DES MOINES — State officials are moving forward with a coordinated strategy to beef up Iowa’s efforts to combat cybersecurity attacks or threats with a special emphasis on protecting critical infrastructure and guarding against communication breaches that might threaten government or private operations. Bob Von Wolffradt, the […]

by

When cybersecurity professionals converged in Las Vegas last week to expose vulnerabilities and swap hacking techniques at Black Hat and Defcon, a consistent theme emerged: the internet is broken, and if we don’t do something soon, we risk permanent damage to our economy. “Half of all Americans are backing away from the net due to […]

by

Russian antivirus company Kaspersky Lab reports it discovered a cyber espionage group in 2015 that was able to steal confidential information from offline computers using USB sticks. The group calls itself Project Sauron and is likely state sponsored. The group, active between June 2011 and May 2016,  mainly targeted governmental organisations using tools that were […]

by

In action five years, highly selective threat actor has only been known to compromise seven organizations. Symantec has discovered a previously unknown cyberespionage group so selective in its targets that it is only known to have compromised seven organizations and 36 endpoints since it started operating five years ago. Dubbed “Strider” by Symantec, the threat […]

by

Millionaire MK’s plan: Partners in business will be partners for peace Author: Mazal Mualem Posted August 8, 2016 In recent months, Knesset member Erel Margalit (Zionist Camp) has flown almost every weekend to meetings, most of them secret, with “senior business and political figures” in the Arab world, as he puts it, and tried to market the “common interests plan.” This new diplomatic plan […]

by

This article was originally published on The Conversation. Read the original article. Imagine you woke up to discover a massive cyber attack on your country. All government data has been destroyed, taking out health care records, birth certificates, social care records and so much more. The transport system isn’t working, traffic lights are blank, immigration […]

by

August 08, 2016 Kenneth Geers, senior research scientist at Comodo, speaking at Black Hat. NATO’s recent Warsaw Summit proclamation that cyberspace is an official domain of warfare, along with Russia’s reported cyber aggressions against the U.S. and Ukraine, raises interesting logical and ethical questions about how one can responsibly plan and manage cyber-warfare. Kenneth Geers, […]

by

/ MEDIA STATEMENT / Successful Operation to Combat Cybercriminals is the Result of Close Cyber Threat Information Cooperation Between Fortinet and INTERPOL   Derek Manky, Global Security Strategist, from Fortinet says that, “Fortinet is taking action to fight cybercrime not only via product and services innovation with our Fortinet Security Fabric, but also global public […]

by

  A few years from now, if someone writes the history of advanced, highly sophisticated cyber-threats, they will probably start with Stuxnet, and work their way through campaigns like Red October, Darkhotel and Equation. These, and other highly complex attacks, are names that every security researcher knows, and they have significantly affected cyber-threat evolution. But […]

by

Businesses around the world report a shortage in cyber-security talent. Here are the skills IT managers should be seeking to keep their data secure. (Image: Vm/iStockphoto) Organizations across industries are challenged to address a cyber-security skills shortage leaving their networks open to attacks. There will be 1 million to 2 million unfilled cyber-security jobs worldwide […]

by