Cyber Espionage

JERUSALEM (Reuters) – Israeli Prime Minister Benjamin Netanyahu alleged on Wednesday that Iran could blackmail his main election rival, Benny Gantz, after hacking the former armed forces chief’s phone, even as Tehran denied doing so. Without providing any evidence or details, Netanyahu said Iran had gleaned “sensitive information”. His comments, in a brief speech broadcast […]

by

Measures to tackle cybersecurity threats and improve the safety of internet users will be announced by Richard Bruton, the communications minister. It will be the second national strategy on cybersecurity since the first was published in 2014 and expired in 2017. Measures will protect against threats such as hacking, cybercrime, which includes identity theft and […]

by

As Europe is nearing the end of an extremely turbulent mandate, the bloc is starting to realise just how much ground has been lost in preparing for a brave new economic world. Although the EU remains absorbed by Brexit negotiations, it finally had its wake-up moment. Like the detective played by Chazz Palminteri in ‘Usual […]

by

New consultation seeks input on national cyber-attack strategy Published 19 March 2019 A new public consultation is seeking input to a Government strategy to protect individuals, businesses and Ireland’s national security from cyber-attacks. Communications Minister Richard Bruton launched the consultation on the new National Cyber Security Strategy this morning. The strategy will set out the […]

by

By Rich Heidorn Jr. WASHINGTON — Former NERC executive Brian Harrell, now assistant director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, last week lamented the federal government’s tardy response to the security threat drones pose to utilities. While many utilities are using drones in storm response and in monitoring vegetation growth […]

by

TECHNOLOGY has become a new battlefield in US–China relations. But it could also be an arena for immense cooperative possibility if the framework underpinning two-way technology flows is fair, equitable and reciprocal. There should be no space to secure under-handed advantages via cyber-enabled intellectual property (IP) theft. Fair competition and technology cooperation are two sides of the […]

by

On March 6, 2019, the FBI contacted Citrix to advise they had reason to believe that international cyber criminals gained access to the internal Citrix network, according to Stan Black, CISSP and the CSIO of Citrix. He wrote in a blog that “Citrix has taken action to contain this incident. We commenced a forensic investigation; […]

by