Cyber Threats

Three months after a Department of Homeland Security intelligence report downplayed the threat of a cyber attack against the U.S. electrical grid, DHS and the FBI began a nationwide program warning of the dangers faced by U.S. utilities from damaging cyber attacks like the recent hacking against Ukraine’s power grid. The nationwide campaign by DHS […]

by

The debate in Parliament on the Aadhaar Bill, 2016, is quite revealing. Concerns expressed that the Bill contained certain provisions [Section 29(iv) and Section 33] that provide avenues for ‘surveillance’ of citizens require a discussion to remove any lingering suspicion about the government’s intentions. The parliamentary debate reminds us of concerns expressed in the United […]

by

Are hackers from China stealing U.S. secrets? China has denied these allegations for years. But a recent report by cybersecurity firm Mandiant thoroughly documents the activities of a team in China that has apparently ransacked terabytes of data from U.S. corporations. Our technology commentator, Strategic News Service publisher Mark Anderson, has been warning us about […]

by

/ AP BY: Bill Gertz Follow @BillGertz April 8, 2016 6:10 pm Three months after a Department of Homeland Security intelligence report downplayed the threat of a cyber attack against the U.S. electrical grid, DHS and the FBI began a nationwide program warning of the dangers faced by U.S. utilities from damaging cyber attacks like […]

Pirates seizing cargoes, attacks against wastewater purification facilities, ransomware in hospitals, and stealing from global financial institution – it seems that cyber attacks are becoming more common, aggressive, focused and harmful in all areas. A look at printed analysis reports and trends in cyber attacks over the past year provides a rather clear picture – […]

Pirates seizing cargoes, attacks against wastewater purification facilities, ransomware in hospitals, and stealing from global financial institution – it seems that cyber attacks are becoming more common, aggressive, focused and harmful in all areas. A look at printed analysis reports and trends in cyber attacks over the past year provides a rather clear picture – […]

Nearly 86% of organizations responding to the survey want to be doing the hunting, albeit informally, as more than 40% do not have a formal threat hunting program in place. “The question is no longer whether or not you are going to have a breach, but how quickly you will detect the adversary to control […]