Software powering Britain’s nuclear-tipped Trident II missiles is to be updated following fears of a cyber-attack, according to reports. The Daily Telegraph reported that Britain’s Trident missiles, currently carried by the Royal Navy’s Vanguard-class submarines, are to receive software updates to help guard against cyber-attacks. The move comes as part of the Ministry of Defence’s […]

by

Federal investigators charged an Iranian hacker with breaking into the control system of the Bowman Avenue Dam, in Rye, N.Y. The mystery is what he was after. Credit Photograph by Seth Wenig / AP The Bowman Avenue Dam, in Rye, New York, would seem an unlikely candidate for a new front in the cyber wars. […]

by

Canadian Quidditch player Arfy Papadam. Probably not how the Israeli military do it. Photo: Jeff de Pasquale JDE The Israeli military’s elite Cyber Command is honing its skills at Hogwarts. A small, handpicked group of computer wizards in the command’s officers training course is preparing to combat hostile hackers by fighting in a virtual battlefield modelled […]

by

DARPA is preparing for the threat You might not know this, but the Internet wasn’t built for you and me. Back in the 1960’s, which somehow seems like an eternity ago, DARPA (Defense Advanced Research Projects Agency) envisioned a network of computers that could collaborate on scientific and technological research projects from coast to coast. […]

by

In a meandering, 100-minute-long telephone interview with The New York Times last week, Donald Trump elaborated on some of the bold and belligerent foreign-policy prescriptions he’s hinted at in the past. He touched on nuclear weapons, spying, and the fight against ISIS, bringing his tried-and-true “we’re losing” doom and gloom to each topic. His proclamations […]

by

James Q. Lynch The Gazette More stories from James DES MOINES — In the escalating war on cybercrime, the U.S. Department of Justice last week unsealed indictments charging Iranian hackers with attacks on 46 major financial institutions that cost victims tens of millions of dollars. It also unsealed a complaint against the Syrian Electronic Army […]

by

Security pros consider the NIST framework an industry best practice, yet half of its adopters say its complete implementation involves a high level of investment. US organizations say the major investment required in fully implementing the NIST Cybersecurity Framework is hampering their full adoption of it, according to a survey report released by Tenable Network […]

by

March 03, 2016 Security researchers laid out potential scenarios for the future of cyberespionage on Wednesday at the RSA Conference in San Francisco. Security researchers laid out potential scenarios for the future of cyberespionage on Wednesday at the RSA Conference in San Francisco. In a session titled “The Dark Web and Cyberespionage,” attendees were presented […]

by